期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2016
卷号:5
期号:12
页码:20429
DOI:10.15680/IJIRSET.2016.0512026
出版社:S&S Publications
摘要:Increasing the usage of cloud computing in today’s business sectors, but there are still issues unsolveddue to inherent problems of cloud computing such as undecisive latency, lack of portability support and locationawareness.Fog computing can address those problems by providing elastic resources and services to end users at theedge of network. Applications and services that require very low and predictable latency, the Cloud frees the user frommany implementation details, including the precise knowledge of where the computation or storage takes place. Themain goal of fog computing is to deliver large quantities of data to more users. It will help optimize traditional cloudwhich uses a geographically distributed platform that can introduce additional latency. Fog computing will helpdistribute data and move it closer to the end user to support better data streaming and mobile computing. We propose adifferent approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloudand detect abnormal data access patterns. When unauthorized access is suspected and then verified using challengequestions, we launch a disinformation attack by returning large amounts of decoy information to the attacker.