Abstract
Fog computing is a process which computes and stores the data, which facilities network services between computing information centers and end devices. Fog computing is additionally fogging or edge computing. Fog computing focuses on increasing the efficiency and to quicken the data computing to cloud for storage and processing. This paper is mainly focus on securing personal information within the cloud employing a fog computing facility and decoy techniques. In the proposed system primary stage each licensed and unauthorized user can refer to the decoy information in fog computing. Using user profiling technique, the authorized user will be identified. If it’s an unauthorized user, they cannot access the original data. If it is an authorized user, then it proceeds to the second stage by verifying the challenges. The challenge can be secured with verification code or else it can be a private question. Once authorized users clear the security challenge, they can access the original data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zunnurhain K, Vrbsky S (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science, Indianapolis, December 2010
Kumar TS (2019) Efficient resource allocation and Qos enhancements of IOT with fog network. J ISMAC 1(02):101–110
Sonali K, Dhanashree B (2014) Fog computing: a new concept to minimize the attacks and to provide security in cloud computing environment. IJRET ISSN:2319–1163 |ISSN: 2321-7308
Reena KM , Sunil Kumar Yadav, Nikhil Kumar Bajaj and Vinay Singh (2017) Security implementation in cloud computing using user behavior profiling and decoy technology. In: International conference on inventive communication and computational technologies (ICICCT)
Abdullah A (2018) Fog computing and security issues: a review. In: 2018 7th international conference on computers communications and control (ICCCC)
Dr. Jordan S (2014) Extending the cloud with fog: security challenges and opportunities. In: 20th Americas conference on information system, Savannah, 2014
Jamil D, Zaki H (2011) Security issues in cloud computing and countermeasures. Int J Eng Sci Technol 3(4):2672–2676
Shanhe Y, Zijiang H, Zhengrui Q, Qun L (2015) Fog computing: platform and applications. In: 2015 Third IEEE workshop on hot topics in web systems and technologies
Ramesh K, Balaji T (2017) Alleviation of data attacks in cloud computing using offensive decoy technology. IJETT, Special Issue
Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Atif Alamri (2017) A security model for preserving the privacy of medical big data in a healthcare cloud Using a fog computing facility with pairing-based cryptography. IEEE Access XXX(XX)
Muqtyar Ahmed S, Namratha P, Nagesh C (2013) Prevention of malicious insider in the cloud using decoy documents. IJERT 2(4) ISSN: 2278-0181
Farhad Foroughi and Peter Luksch (2018) Observation measures to profile user security behavior. In: International conference on cyber security and protection of digital services (cyber security 2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bindu Madavi, K.P., Vijayakarthick, P. (2021). Decoy Technique for Preserving the Privacy in Fog Computing. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_10
Download citation
DOI: https://doi.org/10.1007/978-981-15-5258-8_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5257-1
Online ISBN: 978-981-15-5258-8
eBook Packages: EngineeringEngineering (R0)