首页> 外文会议>International Conference on Communication and Electronics Systems >Protecting data in cloud environment from intruders using fog computing mechanism and control flows
【24h】

Protecting data in cloud environment from intruders using fog computing mechanism and control flows

机译:使用雾计算机制和控制流程从入侵者保护云环境中的数据

获取原文

摘要

Protecting data from masquerades in cloud environment has become imperative. Data is categorized into two types i.e., normal data and critical data. There are standard security techniques that take care of identifying the valid user and allowing access to system data. Even though there are in place strong cryptographic techniques, hackers may trespass and enter the system using some users valid credentials and try access the critical data of the system. The challenge we face in this situation is, even if hacker get access to the system he/she must be limited to access the data. This can be achieved by giving access false data which will be similar to the original data. Deviate the user from normal events is done by streamlining the pattern or behavior of the users and protecting critical data from being accessed by intruders. The job of Cloud service providers is limited only to provide secure network and storage space; it is up to the organization to take preventive measures to secure the system at different levels such as authentication and authorization. Organizations need to add additional mechanism to ensure strong authentication and authorization process from their end. In this paper we have proposed framework to deal with protection of data in cloud applications, by applying the concept of fog computing and control flows to ensure strong authentication and authorization process and data protection.
机译:保护云环境中的伪装数据变得势在必行。数据分为两种类型,普通数据和关键数据。有标准的安全技术,可以处理识别有效用户并允许访问系统数据。尽管存在强大的加密技术,但是黑客可能会使用一些用户有效凭据侵入并进入系统,并尝试访问系统的关键数据。在这种情况下,我们面临的挑战是,即使黑客访问系统,他/她必须仅限于访问数据。这可以通过提供与原始数据类似的访问错误数据来实现。通过简化用户的模式或行为并保护来自入侵者访问的关键数据来实现从正常事件中偏离正常事件。云服务提供商的工作仅限于提供安全的网络和存储空间;组织取决于采取预防措施,以保护系统在不同级别,如认证和授权。组织需要添加额外的机制,以确保从其结束时确保强大的身份验证和授权过程。在本文中,我们已经提出了框架来处理云应用中数据保护,通过应用雾计算和控制流的概念来确保强大的认证和授权过程和数据保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号