International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
Securing Cloud Using Fog: A Review Dipak Khadse1, Akhilesh Amle2, Sarang Charde3, Shubham Deulkar4,Pratik Patil5 1,Department
of Computer Sci. & Engg,Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India of Computer Sci. & Engg,Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India 3Department of Computer Sci. & Engg,Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India 4Department of Computer Sci. & Engg,Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India 5Department of Computer Sci. & Engg,Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------2Department
Abstract - Cloud computing is a platform which provides
The Twitter incident is one example of a data theft attack from the Cloud. Several Twitter corporate and personal documents were exfiltrated to technological website TechCrunch [5], [6], and customers’ accounts, including the account of U.S. President Barack Obama, were illegally accessed [7], [8]. The attacker used a Twitter administrator’s password to gain access to Twitter’s corporate documents, hosted on Google’s infrastructure as Google Docs. The damage was significant both for Twitter and for its customers.
a way of accessing and storing personal as well as business information and also providing its users the resources through the internet. This type of computing invites data security challenges. Large amount of personal and professional data is stored in cloud which needs to be protected from data theft attacks, especially insider attacks. Cloud storage is used massively in industrial sectors. Security remains a major factor which needs to be focused on. We propose a different approach to secure data stored in cloud using User Behavior Profiling and Decoy Technology. We detect unusual data access patterns and monitor data access in cloud. When an unauthorized user activity is suspected and verified by using security questions, we deploy a disinformation attack by returning decoy information to the attacker. This ensures the security of the user’s real data. Key Words: Technology.
User
Behavior
Profiling,
We propose a different approach to secure data stored in cloud known as Fogging. We use user behavior profiling and decoy information to secure the data stored in cloud. We deploy a disinformation attack against unauthorized users or to be precise an attack against malicious insiders using these two mechanisms we prevent them from discovering the original sensitive information.
Decoy
1.1 User Behavior Profiling: It is expected that access to a user’s information in the Cloud will exhibit a normal means of access. User profiling is a well known technique that can be applied here to model how, when,and how much a user accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. We monitor for abnormal search behaviors that exhibit deviations from the user baseline. According to our assumption,such deviations signal a potential masquerade attack.
1.INTRODUCTION Cloud storage is an strategical approach of networked enterprise storage where the data is stored in virtualized pools of storage. For the business enterprise outsourcing data and storing in cloud has become a natural option. Storing data on cloud has drawbacks which cannot be ignored [1]. Amplification of data theft is normal if the attacker is malicious insider which is considered as one of the top threats to cloud computing by the Cloud Security Alliance [2]. Cloud computing users are aware well-aware of this threat and the only option is to trust the service provider for protecting their data. Masqueraders acts as legitimate users after obtaining the credentials of authorized users when they try to gain access of Cloud. When the masqueraders logs in with the stolen credentials, he acts as the legitimate user with the same access rights as the real user [4].
This method of behavior-based security is commonly used in fraud detection applications. Such profiles would naturally include volumetric information, how many documents are typically read and how often. These simple user-specific features can serve to detect abnormal Cloud access based partially upon the scale and scope of data transferred. 1.2 Decoy Technology: Decoy information, such as decoy documents, honeyfiles, honeypots, and various other bogus information can be generated on demand and serve as a means of detecting unauthorized access to information and to ‘poison’ the thief’s exfiltrated information. Serving decoys will confound and confuse an adversary into believing they have ex-filtrated useful information, when they have not. A
One of the example being the credit card data breach at Marriot, Sheraton and other hotels. The company said information subject to potential theft by cyber criminals included names and numbers on consumers' debit or credit cards, security codes and card expiration dates.
© 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 77