CLOUD SECURITY USING FOG COMPUTING

CLOUD SECURITY USING FOG COMPUTING
1
SAYALI RAJE, 2NAMRATA PATIL, 3SHITAL MUNDHE, 4RITIKA MAHAJAN
Abstract- Cloud Computing assures to protect the data on cloud from the data theft attacks, especially insider attacks. A
major amount of professional and personal data is stored on Cloud. Cloud storage is being used enormously in various
industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which
needs to be conquered. Computers are used to access the data on Cloud, with the new communication and computing
paradigms arise new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing
data theft attacks. An altered approach is carried out for securing the data, in addition to the previous standard encryption
mechanisms. The technologies are – 1) User Behaviour Profiling and 2) Decoy Technology. The users using the Cloud are
monitored and their access patterns are recorded. Every User has a distinct profile which is monitored and updated. When an
abnormal activity such as unauthorised access or random and untargeted search for data is detected which is not likely to be
of the real user, a disinformation attack is launched. The person who is trying to access the data is made to answer the
security questions. A large amount of Decoy data is provided to the attacker which in turn protects the user’s real data.
on Multi-keyword Ranked Search which cannot
protect against insider attacker.
I. INTRODUCTION
Cloud storage is a model of networked enterprise
storage where data is stored in virtualised pools of
storage. Outsourcing data and storing in on Cloud
has become an extremely convenient option for the
business sector. In spite of an excellent operational
efficiency, storing data on cloud has its own set of
drawbacks which cannot be ignored. Masqueraders
mimic legitimate users after stealing their credentials
when they access of Cloud. When the masqueraders
logs in with the stolen credentials, he acts as the
legitimate user with the same access rights as the real
users. This type of attack is an insider attack [2]. The
data theft attacks carried out by an insider is one of
the top threats to Cloud security. Given the headlines
over the past couple of years, there remains a concern
about outages, loss of control over security policies,
exposing data to attack or privacy breaches.
We propose a distinct approach to secure cloud
known as Fog Computing. We use decoy information
and user behaviour profiling to secure data on Cloud.
We launch a disinformation attack against malicious
insiders using these two technologies thus preventing
them from distinguishing the real sensitive
information from the fake data.
II. SYSTEM MODEL
There are three different entities as illustrated in Fig.
1: the data owner, the Cloud service provider and the
Cloud server. During the registration procedure the
client requests for space on the Cloud. The CSP
processes this request and grants access to the client
on the Cloud sends an email to the client consisting of
a system created password. Once the client is
registered, he can upload, download and access his
data on the Cloud.
One of the latest examples being the credit card data
breach at Marriot, Sheraton and other hotels. The
company said information subject to potential theft
by cyber criminals included names and numbers on
consumers' debit or credit cards, security codes and
card expiration dates.
Another example is the one which happened in
Berlin. Cell phone and broadband provider Vodafone
Deutschland says it was the target of a large-scale
data theft affecting the personal details of 2 million
German customers. Spokesman Alexander Leinhos
says the attack was conducted by an unidentified IT
systems administrator who worked for a company
.Vodafone said in a statement Thursday that the
stolen data included customers' names, addresses, etc
and was done by an insider attacker.
Various security mechanisms have focused on ways
of preventing illegal and unauthorised access to data
present on the Cloud. This has been done through
various encryption techniques. Ning Cao, Cong Wang
and others proposed an encryption technique based
Fig.1: System model
Proceedings of IRF International Conference, 30th March-2014, Pune, India, ISBN: 978-93-82702-69-6
5
Cloud Security using Fog Computing
with a one class modelling technique, namely oneclass support vector machines. This was done to
maintain the privacy of user and secure the users data.
III. SECURING CLOUD WITH FOG
Many proposals were put forward for securing data
on the Cloud using various encryption techniques.
These techniques have been unsuccessful in securing
data from insider attackers. Other reasons are misconfigured services, faulty implantation, and buggy
code.
A pattern of the normal user behaviour is modelled
.this model is then compared to the behaviour of the
person accessing the system, to check whether the
person is a real user or a masquerade [1].
1) User behaviour profiling: User behaviour profiling
is a reputable technique that is used to determine
when and how frequently the user accesses his data
on the Cloud. The way of access to a user’s
information on the Cloud is predictable. This
behaviour of the user is checked continuously to
detect an abnormal activity. Each user has a distinct
profile consisting of the number of times he has
accessed his files on the Cloud. These profiles
maintain a count of the number of times a file is
accessed. If there is any deviation in the user
behaviour profile which is already stored in database
then an attack is detected.
2) Decoys: The file system is packed together with
traps these traps are upload on the system by the
Cloud service provider. These traps can contain
documents like credit card details, tax returns, bank
statements. These documents are places in highly
egregious places. A masquerader who is not
acquainted with the system and who has an ill intent
may is likely to click on these false documents. They
may believe that he has ex-filtrated important
information, when they have not. When a decoy
document is downloaded an alert can be generated.
Thereby the system can be notified of masquerade
activity.
2) Decoy Technology: The file system is packed
together with traps these traps are upload on the
system by the Cloud service provider. These traps can
contain documents like credit card details, tax returns,
bank statements. These documents are places in
highly egregious places.
A masquerader who is not acquainted with the system
and who has an ill intent may is likely to click on
these false documents. Thereby the system can be
notified of masquerade activity.
The hash code of all the legitimate and decoy
documents upload on the system is calculated. The
hash code of every document downloaded is matched
with the hash code of the decoy document. If a match
is found then the document is deemed to be a decoy
document and an alert is generated. An insider
attacker would not be able to escape detection if they
access a decoy document.
The hash code is based on keyed-Hash Message
Authentication Code (HMAC).
HMAC code:
HMAC that is keyed hashed message authentication
code which is used for calculating a message
authentication code. It involves a cryptographic hash
function along with a secret key. We are calculating
the HMAC code of the document by using the MD5
Algorithm.MD5 processes a document of variable
length into a fixed length output of 128 bits.
 Variable length to fixed length output.
 Input n-bit blocks
 Input divided into 512 bit blocks
 Padding is done
 Buffer initialization
 Output 128 bit
This technology is incorporated along with User
behaviour profiling. When illegal access is suspected
and later verified through various means, such as
security question, a disinformation attack may be
launched. In this attack, the attacker is provided with
false information and made to believe that the
information that he has received is true. This secures
the users actual data.
IV.
COMBINING
USER
BEHAVIOUR
PROFILING AND DECOY TECHNOLOGY
FOR MASQUERADE DETECTION
1) User Behaviour Profiling: Legitimate Users of the
Cloud system are acquainted with the documents and
information on the Cloud system they have stored.
The search for documents is to the point and limited.
A masquerade gets access to the victim’s system
illegitimately, is unlikely to be acquainted with the
structure and contents of the file system. Their search
is not to the point and widespread.
The user search behaviour is profiled and developed
based on this key assumption, user models trained
Fig. 2: MD5 algorithm
Proceedings of IRF International Conference, 30th March-2014, Pune, India, ISBN: 978-93-82702-69-6
6
Cloud Security using Fog Computing
The advantages of placing decoys in a file system are
threefold:
(1) The detection of masquerade activity
2) The insider attack can be detected.
3) The accuracy of detection of a masquerader a
great by combining the technique.
(2) The confusion of the attacker and the additional
costs incurred to identify the real information from
bogus information.
4) The confusion of the attacker through decoy
documents safeguards the actual data of the user.
3) The combination of the two techniques: The
combination of user behaviour profiling with decoy
technology provides a strong evidence of illegal
access and helps improve accuracy of detection. Only
user one technique can produce false positive results.
By combining the two techniques the rate of detecting
illegal access increases.
V. FUTURE SCOPE

The user behaviour is detected by using an access
pattern. The access pattern may be determined by the
number of times the document or file is opened or
downloaded. This record is maintained. When a user
access the system, his behaviour is matched with the
user behaviour profile stored in the database. If the
behaviour matches, it is said that the real user is
accessing the data or else it said that a masquerader is
accessing the data.

Unique user behaviour profiles are
maintained for each user, every time the user
logs in, his behaviour is matched with his
own existing profile stored in the database.
If the user behaviour does not coincide with
the one stored in the database then an attack
will be detected.
Study of how attacker behaviour changes
based on their knowledge about the
monitoring mechanisms running on the
victim's system and their perception of risk
and expected financial gain.
Data can also be split up and stored on multiple
Clouds for providing additional security.
Once unauthorized data access or masquerade activity
is verified, with challenge questions for instance, a
decoy document attack is launched. Here the
masquerader is deliberately given false information
and the user documents are secured. A mail is sent to
the real user and the Cloud service provider
informing them about the masquerade activity.
REFERENCES
At the same time, to secure the data if the user
behaviour matched the real user traps or decoy
documents are merged with the user’s data. These
documents are places in highly egregious places. A
masquerader who is not acquainted with the system
and who has an ill intent may is likely to click on
these false documents. Thereby the system can be
notified of masquerade activity [1].
Advantages:
1) The information stored on the Cloud can be
secured commensurable way.
[1]
Ben-Salem M., and Stolfo, Angelos D. Keromytis, “Fog
Computing: Mitigating Insider Data Theft Attacks in the
Cloud,” IEEE symposium on security and privacy workshop
(SPW) 2012.
[2]
Ben-Salem M., and Stolfo, “Decoy Document Deployment
for Effective Masquerade Attack Detection,” Computer
Science Department, Columbia University, New York.
[3]
Ben-Salem, M., and Stolfo, S. J., “Modelling user searchbehaviour for masquerade detection,” In Columbia
University Computer Science Department, Technical Report
# cucs-033-10 (2010).
[4]
Bowen, B. M., Hershkop, S., Keromytis, A. D., and Stolfo,
S. J., “Baiting inside attackers using decoy documents.” in
Department of Computer Science Columbia Universit,
2009.
[5]
Mihir Bellare, Ran Canetti, Hugo Krawczyk. “Message
Authentication using Hash Functions --- The HMAC
Construction ”.In RSA Laboratories’ CryptoBytes, Vol. 2,
No. 1, Spring 1996.

Proceedings of IRF International Conference, 30th March-2014, Pune, India, ISBN: 978-93-82702-69-6
7