首页> 外文会议>International Conference on Communication and Electronics Systems >Protecting data in cloud environment from intruders using fog computing mechanism and control flows
【24h】

Protecting data in cloud environment from intruders using fog computing mechanism and control flows

机译:使用雾计算机制和控制流保护云环境中的数据不受入侵者的侵害

获取原文

摘要

Protecting data from masquerades in cloud environment has become imperative. Data is categorized into two types i.e., normal data and critical data. There are standard security techniques that take care of identifying the valid user and allowing access to system data. Even though there are in place strong cryptographic techniques, hackers may trespass and enter the system using some users valid credentials and try access the critical data of the system. The challenge we face in this situation is, even if hacker get access to the system he/she must be limited to access the data. This can be achieved by giving access false data which will be similar to the original data. Deviate the user from normal events is done by streamlining the pattern or behavior of the users and protecting critical data from being accessed by intruders. The job of Cloud service providers is limited only to provide secure network and storage space; it is up to the organization to take preventive measures to secure the system at different levels such as authentication and authorization. Organizations need to add additional mechanism to ensure strong authentication and authorization process from their end. In this paper we have proposed framework to deal with protection of data in cloud applications, by applying the concept of fog computing and control flows to ensure strong authentication and authorization process and data protection.
机译:在云环境中保护数据免受伪装已成为当务之急。数据分为两种类型,即普通数据和关键数据。有一些标准的安全技术可以识别有效用户并允许访问系统数据。即使存在强大的加密技术,黑客也可能会使用某些用户的有效凭据侵入并进入系统,并尝试访问系统的关键数据。在这种情况下,我们面临的挑战是,即使黑客可以访问系统,也必须限制他/她访问数据。这可以通过提供与原始数据相似的错误数据来实现。通过简化用户的模式或行为并保护关键数据免遭入侵者访问,可以使用户偏离正常事件。云服务提供商的工作仅限于提供安全的网络和存储空间;组织应采取预防措施以在不同级别保护系统的安全,例如身份验证和授权。组织需要添加其他机制,以确保从头开始进行强大的身份验证和授权过程。在本文中,我们提出了一种框架,通过应用雾计算和控制流的概念来确保强大的身份验证和授权过程以及数据保护,从而解决云应用程序中的数据保护问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号