Skip to main content
Top

2021 | OriginalPaper | Chapter

Decoy Technique for Preserving the Privacy in Fog Computing

Authors : K. P. Bindu Madavi, DR. P. Vijayakarthick

Published in: Evolutionary Computing and Mobile Sustainable Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Fog computing is a process which computes and stores the data, which facilities network services between computing information centers and end devices. Fog computing is additionally fogging or edge computing. Fog computing focuses on increasing the efficiency and to quicken the data computing to cloud for storage and processing. This paper is mainly focus on securing personal information within the cloud employing a fog computing facility and decoy techniques. In the proposed system primary stage each licensed and unauthorized user can refer to the decoy information in fog computing. Using user profiling technique, the authorized user will be identified. If it’s an unauthorized user, they cannot access the original data. If it is an authorized user, then it proceeds to the second stage by verifying the challenges. The challenge can be secured with verification code or else it can be a private question. Once authorized users clear the security challenge, they can access the original data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zunnurhain K, Vrbsky S (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science, Indianapolis, December 2010 Zunnurhain K, Vrbsky S (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science, Indianapolis, December 2010
2.
go back to reference Kumar TS (2019) Efficient resource allocation and Qos enhancements of IOT with fog network. J ISMAC 1(02):101–110 Kumar TS (2019) Efficient resource allocation and Qos enhancements of IOT with fog network. J ISMAC 1(02):101–110
3.
go back to reference Sonali K, Dhanashree B (2014) Fog computing: a new concept to minimize the attacks and to provide security in cloud computing environment. IJRET ISSN:2319–1163 |ISSN: 2321-7308 Sonali K, Dhanashree B (2014) Fog computing: a new concept to minimize the attacks and to provide security in cloud computing environment. IJRET ISSN:2319–1163 |ISSN: 2321-7308
4.
go back to reference Reena KM , Sunil Kumar Yadav, Nikhil Kumar Bajaj and Vinay Singh (2017) Security implementation in cloud computing using user behavior profiling and decoy technology. In: International conference on inventive communication and computational technologies (ICICCT) Reena KM , Sunil Kumar Yadav, Nikhil Kumar Bajaj and Vinay Singh (2017) Security implementation in cloud computing using user behavior profiling and decoy technology. In: International conference on inventive communication and computational technologies (ICICCT)
5.
go back to reference Abdullah A (2018) Fog computing and security issues: a review. In: 2018 7th international conference on computers communications and control (ICCCC) Abdullah A (2018) Fog computing and security issues: a review. In: 2018 7th international conference on computers communications and control (ICCCC)
6.
go back to reference Dr. Jordan S (2014) Extending the cloud with fog: security challenges and opportunities. In: 20th Americas conference on information system, Savannah, 2014 Dr. Jordan S (2014) Extending the cloud with fog: security challenges and opportunities. In: 20th Americas conference on information system, Savannah, 2014
7.
go back to reference Jamil D, Zaki H (2011) Security issues in cloud computing and countermeasures. Int J Eng Sci Technol 3(4):2672–2676 Jamil D, Zaki H (2011) Security issues in cloud computing and countermeasures. Int J Eng Sci Technol 3(4):2672–2676
8.
go back to reference Shanhe Y, Zijiang H, Zhengrui Q, Qun L (2015) Fog computing: platform and applications. In: 2015 Third IEEE workshop on hot topics in web systems and technologies Shanhe Y, Zijiang H, Zhengrui Q, Qun L (2015) Fog computing: platform and applications. In: 2015 Third IEEE workshop on hot topics in web systems and technologies
9.
go back to reference Ramesh K, Balaji T (2017) Alleviation of data attacks in cloud computing using offensive decoy technology. IJETT, Special Issue Ramesh K, Balaji T (2017) Alleviation of data attacks in cloud computing using offensive decoy technology. IJETT, Special Issue
10.
go back to reference Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Atif Alamri (2017) A security model for preserving the privacy of medical big data in a healthcare cloud Using a fog computing facility with pairing-based cryptography. IEEE Access XXX(XX) Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Atif Alamri (2017) A security model for preserving the privacy of medical big data in a healthcare cloud Using a fog computing facility with pairing-based cryptography. IEEE Access XXX(XX)
11.
go back to reference Muqtyar Ahmed S, Namratha P, Nagesh C (2013) Prevention of malicious insider in the cloud using decoy documents. IJERT 2(4) ISSN: 2278-0181 Muqtyar Ahmed S, Namratha P, Nagesh C (2013) Prevention of malicious insider in the cloud using decoy documents. IJERT 2(4) ISSN: 2278-0181
12.
go back to reference Farhad Foroughi and Peter Luksch (2018) Observation measures to profile user security behavior. In: International conference on cyber security and protection of digital services (cyber security 2018) Farhad Foroughi and Peter Luksch (2018) Observation measures to profile user security behavior. In: International conference on cyber security and protection of digital services (cyber security 2018)
Metadata
Title
Decoy Technique for Preserving the Privacy in Fog Computing
Authors
K. P. Bindu Madavi
DR. P. Vijayakarthick
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5258-8_10