SURVEY ON INSIDER DATA THEFT MISUSE ATTACKS IN THE CLOUD
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 2)Publication Date: 2014-02-28
Authors : G. Dileep Kumar Kolla Morarjee;
Page : 26-29
Keywords : Fog computing; decoy information; decoy technology; data access; and malicious insider;
Abstract
Cloud Computing enables multiple users to, share common resources, and to store their personal and business information and access them. The major of the cloud users are from the internet. The users those who have valid authority on the cloud are called insiders. In all the remote users are to be treated as attackers in the security perspective. If the remote user is not an attacker then that should be checked by the security systems. If a valid user’s access details are stolen by an attacker, then attacker can enter and access the cloud as a valid user. Distinguishing the valid user and the attacker, the protection of the real user’s sensitive data on the cloud from the attacker and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.
Other Latest Articles
- Secure Key Distribution over TOR Networks in Mobile Social Networks
- An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
- SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS?
- A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups?
- Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept?
Last modified: 2014-02-14 15:50:58