International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 4 Issue: 3 595 – 597 _______________________________________________________________________________________________ 595 IJFRCSCE | March 2018, Available @ http://www.ijfrcsce.org _______________________________________________________________________________________ Different Approach to Secure Data with Fog Computing Dr. Vishal Kumar Goar Assistant Professor Govt. Engineering College Bikaner (India) Abstract -Fog computing could be a paradigm that extends cloud computing that has become a reality that made-up the method for brand new model of computing. additionally, fog provides application services to finish terminal within the age of network. The inner information stealing attacks in that a user of a system illegitimately poses because the identity of associate other legitimate user which is an arising new challenge to the service supplier wherever cloud service supplier might not be able to defend the information. therefore, to secure the important user’s sensitive data type the offender within the cloud. In this research paper I am proposing a very distinct approach with the assistance of offensive decoy data technology, that is employed for confirming whether or not the data access is permitted wherever abnormal information is detected andthereby confusing the offender with the fake data. Keywords-Fog Computing; Decoy Technology; Cloud Computing; Security; __________________________________________________*****_________________________________________________ I. INTRODUCTION Cloud computing is nothing however computing power that is virtualized and thru platform-agnostics delivery of storage infrastructures of abstracted hardware and web package. The shared, on-demand IT resources, square measure created and disposed of effectively, square measure dynamically ascendible through a range of programmatic interfaces and cloud computing could be a general term for all the world that involves delivery hosted services over `the web. Cloud is being employed in varied preparation models and repair models. Out of these three service models, rock bottom layer is infrastructure as a service (IaaS) provides virtual machines and alternative resources like block and file storage, network security, load leveling, virtual local area networks (VLANs) etc. The second layer type rock bottom is Platform as a service here, cloud service supplier delivers a computing platform like software system, execution setting (programming language), information and net servers. Some PaaS service suppliers like Windows Azure, Google AppEngine alter the computers and storage resources vary mechanically to match application demand in order that the cloud user dos not need to allot resources manually. The last service model could be a software as a Service (SaaS), user square measure provided access to application package and databases. SaaS are some things additionally known as on demand service of package and is typically obtainable on a pay-per-use basis. With this new computing and communication paradigms arise a brand-new information security challenges. Existing information protection mechanisms like cryptography have failing in preventing the information thievery attack, particularly those perpetrated by AN business executive to cloud supplier. In this research paper, proposed a very completely different approach to securing the cloud mistreatment the decoy info technology that we've got return to decision Fog computing. like Twitter attack, by deploying decoy info inside a Cloud by the Cloud service client and inside personal on-line social networking profiles by individual users. we tend to use this technology to launch misinformation attacks against malicious Associates, preventing them from characteristic the important sensitive client information from faux trashy information. II. INFORMATIONROBBERY A very high and executable service is given to the business organizations, that for his or her secured information trust the suppliers of the cloud services. however, this work isn't as less complicated to try and do just in case of personal services of cloud, as less complicated it sounds. one amongst the key attacks in cloud is information felony. as an example, a series of cyber-attacks hanging major banks as believed by U.S. officials, were the work of Iranian government to increase cyber security standoff between the 2 nations. By infecting information centers at clouds rather than computers, the hackers obtained the computing power to mount huge denial of service attacks. Thus, to limit the attacks of this sort we will cut back the worth of the info that is being hold on the cloud. III. SAFEGUARDING CLOUD THROUGH FOG For securing information of cloud, none out of all the projected strategies is full proof because of numerous reasons. Let or not it's customary access or the coding mechanism being employed for securing cloud, they need failing as a result of a cloud's reliable atmosphere solely, isn't enough for the client. Nowadays, the client needs security that is healthy for its applications and information. therefore, such incidences should even be controlled. If we tend to decrease the worth of taken information by providing decoy documents then we will limit the hurt of the system. Following options of additional security are proposed: