Ashvini Machale, Hemlata Mulay, Varsha Taware and Virendrakumar Dhotre
We propose a completely different approach to securing the cloud using auto log-out, that we have come to call Fog computing. This option is being configured by us: to use the auto-logout against fake users who try to get the data. The function of auto-log out, serves two purposes: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker by logging then out from the system. The customers who use the cloud only pay for what they use and have not to pay for local resources which they need such as infra or storage. This acts as the main benefit and the main reason for gaining popularity in today’s world. In order to overcome the issue of security we are introducing the new technique which is called as Fog Computing . This does not replace the cloud as a system, it just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to improvise the cloud experience by isolating users data that is important. The main objective of the fog computing is to place the data close to the user.
Cloud, Cloud Computing, Fog Computing Security, Auto-logout Technology.