MULTI-TIER SECURITY TECHNIQUE FOR DATA LEAKAGE DETECTION AND PREVENTION IN FOG COMPUTING ENVIRONMENT.
- Sree Dattha Institute of Engineering and Science, Ibrahimpatnam, Hyderabad, 501506, India.
- ITM University, Gwalior, 475001, India.
- Abstract
- Keywords
- References
- Cite This Article as
- Corresponding Author
In this growing world of technology, Cloud computing is accomplishing stardom because of its usage and storage which is accommodate to users for personal as well as business prospects is rising its requirements. Most of users are devoted cloud computing for its fluidity and ease of access. Cloud computing is a consolidation of service oriented architecture and various computing procedures such as virtualization, fluidity, service-oriented architecture, and assets management. The reinforcement of Cloud computing technology handle various analytical problems such as security, availability, accountability, confidentiality, privacy, data provenance, customization, performance unpredictability, technology bottlenecks, data leakage, data remanence, data inter portability etc., which are addressed in many researches. Very ordinary threat today?s in geographical distributed cloud frame is data leakage. It is examined as the top threats to user data in cloud environment. To conquer this threat a technique is required which can detect the malicious activities. Combination of Fog computing and cloud computing are such a paradigm which helps in monitoring and identifying the unauthorized accesses. As we know that Fog computing is well suited for geographical distributed cloud surroundings to provide better security. So, it is important to provide secured Multi-tier technique for data leakage detection and prevention in fog computing environment. In this paper we are introducing resource and security algorithm along with the architecture. It is hard to trust the third party service provider. This algorithm has two accepts such as providing a secure resource between two cloud servers which are geographically distributed and ensuring the high security in multiple level.
- Archer, Jerry (2010). Top threats to cloud computing 0. Cloud???? Security Alliance.
- Bijayalaxmi Purobit, Pawan Singh. Data leakage analysis on cloud computing, International Journal of Engineering Research and Application ()2013, vol.3,issue 3,May-June 2013,page no. 1311-1316.
- Bonomi, Flavio (2012). Fog computing and its role in the internet of things. Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM, pp. 13-16.
- Hashizume K., Rosado D. G., Fernandez- Medina E. and Fernandez E. B. 2013 An analysis of security issues for cloud computing?. Journal of Internet Services and Applications, 4(1), pp. 1-13
- IBM Blue Cloud project [URL] (2009). http://www03.ibm.com/ press/us/en/press release/22613.wss/, access on
- Ma Jun,Wang Zhiying, Ren Jiangchun,Wu Jiangjiang, Cheng Yong and Mei Songzhu (2012). The Application of Chinese Wall Policy in Data Leakage Prevention In International Communication Systems and Network Technologies,
- Armbrust, A. Fox, R. Griffith, A.D. Joseph,R . Katz, A.Konwinski, G. Lee, D. Patterson, A.Rabkin,I. Stoica, and M.Zaharia (2010). A view? of cloud computing , Common .ACM, vol. 53, no. 4,,pp.50-58.
- Miss S.W. Ahmad, Dr G.R.Bamnote (2013). Data Leakage Detection and Data Prevention using Algorithm, International Journal Of Computer Science And Applications Vol. 6, No.2, ISSN: 0974-1011 (Open Access) Available at: www.researchpublications.org
- Narendra Babu Pamula, M.Siva Naga Prasad K.Deepti. (2013) Preventing Data Leakage in Distributive Strategies by Steganography Technique,? International Journal of Computer Science and Information Technology, vol 4 (2), ,220-223
- Panagiotis Papadimitriou; Hector Garcia Molina, Peter Gordon. (2015) Data Leakage Detection of Guilty Agent In International journal of Scientific and Engineering Research vol 3,issu, 6,.
- Mell and T. Grance (2009). The NIST Definition of Cloud Computing, National Institute of Standards and?? Technology, vol. 53, no. 6, p. 50,. [Online]Available http://csrc.nist.gov/groups/SNS/Cloud-computing/cloud-def-v15.doc
- Swati Agarwal, Shashank Yadav, Arun Kumar Yadav(2015). An architecture for elastic resource allocation in Fog computing, International Journal of Computer Science and Communication, Vol. 6 Number 201-207.
- Shobana and M. Shanmuga Sundaram. (2013) Data leakage detection using cloud computing, International Journal of Emerging Technology and Advanced Engineering, vol. 3, page 111-115.
[Darakhshinda Parween and Arun Kumar Yadav. (2017); MULTI-TIER SECURITY TECHNIQUE FOR DATA LEAKAGE DETECTION AND PREVENTION IN FOG COMPUTING ENVIRONMENT. Int. J. of Adv. Res. 5 (Oct). 661-670] (ISSN 2320-5407). www.journalijar.com