Skip to main content

Decoy Technique for Preserving the Privacy in Fog Computing

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Abstract

Fog computing is a process which computes and stores the data, which facilities network services between computing information centers and end devices. Fog computing is additionally fogging or edge computing. Fog computing focuses on increasing the efficiency and to quicken the data computing to cloud for storage and processing. This paper is mainly focus on securing personal information within the cloud employing a fog computing facility and decoy techniques. In the proposed system primary stage each licensed and unauthorized user can refer to the decoy information in fog computing. Using user profiling technique, the authorized user will be identified. If it’s an unauthorized user, they cannot access the original data. If it is an authorized user, then it proceeds to the second stage by verifying the challenges. The challenge can be secured with verification code or else it can be a private question. Once authorized users clear the security challenge, they can access the original data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zunnurhain K, Vrbsky S (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science, Indianapolis, December 2010

    Google Scholar 

  2. Kumar TS (2019) Efficient resource allocation and Qos enhancements of IOT with fog network. J ISMAC 1(02):101–110

    Google Scholar 

  3. Sonali K, Dhanashree B (2014) Fog computing: a new concept to minimize the attacks and to provide security in cloud computing environment. IJRET ISSN:2319–1163 |ISSN: 2321-7308

    Google Scholar 

  4. Reena KM , Sunil Kumar Yadav, Nikhil Kumar Bajaj and Vinay Singh (2017) Security implementation in cloud computing using user behavior profiling and decoy technology. In: International conference on inventive communication and computational technologies (ICICCT)

    Google Scholar 

  5. Abdullah A (2018) Fog computing and security issues: a review. In: 2018 7th international conference on computers communications and control (ICCCC)

    Google Scholar 

  6. Dr. Jordan S (2014) Extending the cloud with fog: security challenges and opportunities. In: 20th Americas conference on information system, Savannah, 2014

    Google Scholar 

  7. Jamil D, Zaki H (2011) Security issues in cloud computing and countermeasures. Int J Eng Sci Technol 3(4):2672–2676

    Google Scholar 

  8. Shanhe Y, Zijiang H, Zhengrui Q, Qun L (2015) Fog computing: platform and applications. In: 2015 Third IEEE workshop on hot topics in web systems and technologies

    Google Scholar 

  9. Ramesh K, Balaji T (2017) Alleviation of data attacks in cloud computing using offensive decoy technology. IJETT, Special Issue

    Google Scholar 

  10. Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Atif Alamri (2017) A security model for preserving the privacy of medical big data in a healthcare cloud Using a fog computing facility with pairing-based cryptography. IEEE Access XXX(XX)

    Google Scholar 

  11. Muqtyar Ahmed S, Namratha P, Nagesh C (2013) Prevention of malicious insider in the cloud using decoy documents. IJERT 2(4) ISSN: 2278-0181

    Google Scholar 

  12. Farhad Foroughi and Peter Luksch (2018) Observation measures to profile user security behavior. In: International conference on cyber security and protection of digital services (cyber security 2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. P. Bindu Madavi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bindu Madavi, K.P., Vijayakarthick, P. (2021). Decoy Technique for Preserving the Privacy in Fog Computing. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics