You are on page 1of 8

Data protection in fog computing

through monitoring and adaptation


Objectives:
 To create user friendly environment.
 To protect the data from insider and outsider attacks.
 To reduce the computational cost in user end.
 To provide effective data access control in group.
 Data protection done using reed solomon encoding technique.

Abstract:
Fog computing has enormous potential to offer increased computational
capacity with acceptable latency near the network edge. However, fog
computing also introduces many risks relating to the protection of
sensitive data, which threaten the practical adoption of the fog
computing paradigm. In this paper, the main challenges of data
protection in fog computing and potential mitigation techniques are
briefly reviewed. We argue that, given the highly dynamic nature of fog
computing systems and the negative side-effects of existing data
protection techniques, such techniques should be used adaptively,
always in accordance with the relevant data protection risks. We sketch
an approach to monitor a fog system and activate data protection
techniques adaptively, followed by a research agenda to elaborate the
details of the proposed approach.
Introduction:
Fog computing is the natural next step in the evolution of cloud
computing, bringing cloud-like elastic compute capacity to the network
edge, near to end user devices. This way, computation-sensitive tasks
can be offloaded from the end devices (like mobile phones, wearable
devices, or cameras) to fog resources (i.e., compute resources at or near
the network edge, e.g., in routers, base stations, or geographically
distributed data centers of telecommunication providers). Offloading is
advantageous for many applications that require higher computational
capacity than what is available in end devices. Compared to offloading
compute tasks to a large centralized cloud data center, fog computing
has the advantage of considerably lower latency in the data transfers,
which is essential for several time-critical applications.
Nevertheless, fog computing is also subject to several challenges.
In particular, fog computing offers a plethora of opportunities for
malicious parties to gain access to, or even manipulate, sensitive
information. Some of these threats are inherited from cloud computing,
but some are new and specific to fog computing. More importantly,
concerns about data protection can significantly hinder the adoption of
the fog computing paradigm. Of course, there are several known security
techniques with which the access to sensitive data can be protected.
However, the available techniques also have some limitations (e.g.,
some assume the availability of special hardware) or drawbacks (e.g.,
overhead)
Problem Statement:

The provider may also let third parties access the data – intentionally or
unintentionally, with or without consent from the user – so that also
these third parties may abuse the data.
Other users to gain unauthorized access to sensitive data.
The existing systems are all improvements of privacy protection in cloud
storage in different aspects. Some of them use variety encryption
policies in different positions. Others solve the privacy problem with the
help of auditing or building their own secure framework. However, there
is a common defect in these researches. Once the CSP is un trusted, all
of these schemes are invalid. They cannot resist internal attacks or
prevent the CSP from selling user’s data to earn illegal profit. The
private data will be decoded once malicious attackers get it no matter
how advanced the encryption technologies are because user’s data was
integrally stored in cloud server.
System Architecture:
Methodology:
Methodologies:
Based on the Reed-Solomon code algorithm, we propose a Hash-Solomon code
algorithm. The Hash-Solomon encoding process is actually a matrix operation.

1) Data selection: This step deals with user will select the data to upload
on cloud.

2) Data Encoding: After selecting the data, data will encode by using
reed-solomon code technique.
4) Data Partition: After encoding data will partitioned into four equal
size.
5) Data upload: This is the main step of the project the partitioned data
50% of data will stored in cloud 25% of data will stored in fog layer and
25% of data will be in local machine .
6) Data Decoding: When user enters the correct key then data will
collected from all three layers and decoded using reed solonon
algorithm.
7) Data download: This is the final step in the process user can
download the decoded data.

Application:

It provides better and efficient security. In past decades many machine


have used the Data Encryption Standard developed by IBM in the mid
1970s that uses a 56-bit key. But in this technique. “Triple DES” scheme
has been put forth that uses three such keys, for an effective 168-bit key
length.
We are using the reed solomon code algorithm which reduces the
computation cost in data protection. In the cloud environment there is
data protection but it is not well secured. Hence, we can use this project
in cloud environment to provide well secured data.
Requirement Specification:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

 System : Pentium Dual Core.


 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB

SOFTWARE REQUIREMENTS:

 Operating system : Windows 7.


 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL
 Cloud : DriveHQ

Conclusion:
It provides better security. It is helpful to increase the data protection
from the insider and outsider attack on the cloud. This is very accurate.
References:

[1] Ting He,Ertugrul N.Cificioglu, Shiquiang Wamg, and Kevin S.Chan, “Location
Privacy in Mobile Edge Clouds:A Chaff-based Approach.

[2] J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, “Joint virtual machine


and bandwidth allocation in software defined network (sdn) and cloud computing
environments, ”in Proc.IEEEInt.Conf.Commun.,2014, pp. 2969–2974.

[3] Clinton Dsouzsa, Gail-Joon Ahn, Mathony Taguinod, “Policy-Driven Security


Management for Fog Computing:Preliminary Framework and A Case Study.

[4] Wissam Razouk, Daniele sgandurra, Kouichi Sakurai, “A New Security


Middleware Architecture Based on Fog Computing and Cloud To Support IOT
Constrained Devices.

[5] R. J. McEliece and D. V. Sarwate, “On sharing secrets and reed-solomon


codes,” Commun. ACM, vol. 24, no. 9, pp. 583–584, 1981.

You might also like