📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 3, MARCH 2017

Decoy Technology in Fog Computing

Arwinder Singh, Abhishek Gautam, Hemant Kumar, Er. C.K. Raina

DOI: 10.17148/IJARCCE.2017.63188

Abstract: Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. In this paper, we proposed a system for securing data stored in the cloud using decoy technology. In this we monitor data access in the cloud and detect abnormal data access. When unauthorised access is detected that users, activity will be tracked in log details table. Based on the activities performed by unauthorized user. Admin can have blocked or delete that user. When a new user enters into this System, he has to register first. After successfully registered, that user will get a key through mail. And during login, if the user enters wrong password continuously more than three times, he will get access and his activity will be tracked on log details table in the database. And after this, whatever activities he is doing that also will be tracked in the log table. If he downloads any file, he won�t get original file. Instead of that he will get decoy file. If a user entered correct password and he will get access. If that user wants to download any file, and he entered wrong key more than three times, in first three cases in the action column invalid will be entered and in the fourth case wrong key and that user will get decoy file. In every case, it Now will execute user behaviour algorithm. When a user edit password, he enters wrong key more than three times, then user will get message that password updated successfully. But in actual case it is not updating.



Keywords: FOG computing, Cloud computing, Decoy, Cisco, edge of network, Cloud Security.

How to Cite:

[1] Arwinder Singh, Abhishek Gautam, Hemant Kumar, Er. C.K. Raina, “Decoy Technology in Fog Computing,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.63188