26-10-2016, 03:03 PM
1461407068-fog.pptx (Size: 809.62 KB / Downloads: 3)
EXISTING SYSTEM CLOUD COMPUTING
CLOUD COMPUTING IS A MODEL FOR ENABLING
COVENIENT,ON DEMAND NETWORK ACCESS TO A SHARED POOL OF CONFIGRABLE COMPUTING RESOURCES THAT CAN BE RAPIDLY PROVISIONED AND RELEASED WITH MINIMAL MANAGEMENT EFFORT.
CLOUD COMPUTING UTILITY
CLOUD MARKET
WHY ADVANCEMENT NEEDED
ENCRYPTION WAS FAILED IN SECURING THE DATA FROM THE ATTACKER.
IT DOES NOT VERIFY WHETHER THE USER IS AUTHORISED OR NOT.
NO BODY IS IDENTIFIED WHEN THE ATTACK HAPPENS.
IT IS COMPLEX TO DETECT WHICH USER IS ATTACK.
WE CAN’T DETECT WHICH FILE IS BEING HACKED.
LATENCY TOO HIGH.
CLOUD COMPUTING SECURITY THREATS
INSECURE APPLICATION PROGRAMMING INTERFACE.
MALICIOUS INSIDERS.
SHARED TECHNOLOGY VULNERABILITY.
DATA LOSS/LEAKAGE.
ACCOUNT,SERVICE & TRAFFIC HIJACKING.
UNKNOWN RISK PROFILE.
PROPOSED SYSTEM (FOG COMPUTING)
DATA PROCESSING AND APPLICATIONS ARE CONCENTRATED IN DEVICES AT THE NETWORK EDGE RATHER THAN THE CLOUD.
PROPOSED TO SECURE USER’S DATA IN CLOUD USING:-
USER BEHAVIOUR PROFILING.
DECOY INFORMATION TECHNOLOGY.
IN THIS TECHNIQUE WHEN THE UNAUTHORISED PERSON TRY TO ACCESS THE DATA, SYSTEM GENERATES THE FAKE DOCUMENTS.
DEVICES COMMUNICATE PEER-TO-PEER TO EFFICIIENTLY STORE/SHARE DATA AND TAKE LOCAL DECISIONS.
FOG COMPUTING SERVICE COVER
APPLICATIONS THAT REQUIRE VERY LOW AND PREDICTABLE LATENCY.
GEOGRAPHICALLY DISTRIBUTED APPLICATIONS.
FAST MOBILE APLICATIONS.
LARGE SCALE DISTRIBUTED CONTROL SYSTEMS.
IMPROVES QUALITY OF SERVICE.
ADVANTAGES OF FOG COMPUTING
FOG AIMS TO PLACE THE DATA CLOSE TO THE END USERS.
BIG DATA AND ANALYTICS CAN BE DONE FASTER WITH BETTER RESULTS.
ADMINISTRATORS ARE ABLE TO SUPPORT LOCATION BASED MOBILIY DEMANDS AND NOT HAVE TO TRAVERSE THE ENTIRE NETWORK.
ENHANCE THE CLOUD EXPERIENCE BY ISOLATING USER DATA THAT NEEDS TO LIVE ON THE EDGE .
SECURING CLOUDS USING FOG (USER BAHAVIOUR PROFILING)
IT INCLUDES VOLUMETRIC INFORMATION,HOW MANY INFORMATIONS ARE TYPICALLY READ AND HOW OFTEN.
“NORMAL USER ” BEHAVIOR IS CONTINUOUSLY CHECKED TO DETERMINE ABNORMAL ACCESS .
THIS SECURITY IS COMMONLY USED IN FRAUD DETECTION APPLICATION.
DECOY SYSTEM
IN THIS SYSTEM BOGUS INFORMATION CAN BE GENERATED ON DEMAND.
IT WILL CONFUSE AN ATTACKER.
THIS TECHNOLOGY CAN BE INTEGRATED WITH USER BAHAVIOR PROFILING TO SECURE A USER’S DATA IN YHE CLOUD.
FOG COMPUTING ARCHITECTURE
SECURITY MEASURES
ANOMALY DETECTION
COMPARED WITH THE PAST BEHAVIOUR OF USER.IF THE USER BEHAVIOUR IS EXCEEDING A LIMIT THEN THE REMOTE USER IS SUSPECTED TO BE ANOMALY.
CHALLENGE REQUEST
SUSPECTED USER IS ASKED FOR RANDOMLY SELECTED SECRET QUESTIONS.
SECURITY & PRIVACY IN FOG COMPUTING
AUTHENTICATION AT DIFFERENT LEVELS OF GATEWAYS.
SMART METERS INSTALLED IN THE CONSUMER’S HOME.
PUBLIC KEY INFRASTRUCTURE(PKI) WHICH INVOLVE MULTICAST AUTHENTICATION.
INTRUSIONS CAN BE DETECTED USING SIGNATURE BASED METHOD.
INTRUSION CAN ALSO BE CAPTURED BY USING AN ANOMALY-BASED METHOD.
CONCLUSION
FOG COMPUTING IS NOT A REPLACEMENT OF CLOUD.
IT JUST EXTENDS THE CLOUD COMPUTING BY PROVIDING SECURITY IN THE CLOUD ENVIRONMENT.
IT IS A NEW APPROACH FOR SECURING DATA IN THE CLOUD BY USING OFFENSIVE DECOY TECHNOLOGY.
IT MONITORS DATA ACCESS IN THE CLOUD AND DETECTS ABNORMAL DATA ACCESS PATTERNS.
BY USING FOG TECHNOLOGY CAN MINIMIZE INSIDER ATTACKS IN CLOUD