Beruflich Dokumente
Kultur Dokumente
CONTENTS
Abstract
Existing System
Disadvantages
Proposed System
Architecture
Conclusion
Future scope
ABSTRACT
Fog computing is not a replacement of cloud it is just extends
EXISTING SYSTEM
In Existing data protection mechanisms such as encryption was
failed in securing the data from the attacker. It does not verify
whether the user was authorized or not.
Cloud computing security does not focus on ways of secure the
data from unauthorized access.
In 2009 we have our own confidential documents in the cloud.
This file does not have much security. so, hacker gains access
the documents. Twitter incident is one example of a data theft
attack in the Cloud.
DISADVANTAGES
No body is identified when the attack is
happen.
It is complex to detect which user is attack.
We can not detect which file was hacking.
PROPOSED SYSTEM
We proposed a completely new technique to secure users
the data of the real user the system generates the fake
documents in such a way that the unauthorized person was
also not able to identify the data is fake or real
USER BEHAVIOR
PROFILING
Admin monitor data access in the cloud and
DECOY SYSTEM
We suggest a different approach for securing
DECOY SYSTEM
DECOY SYSTEM
ADVANTAGES
The decoys, then, serve two purpose
Validating whether data access is authorized
information
ARCHITECTURE
CONCLUSION
The system was developed only with email
FUTURE SCOPE
In our future work, this security system as we