DATA THEFT DETECTION IN THE CLOUD
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.7, No. 6)Publication Date: 2018-06-30
Authors : Atul Vishistha; Nidhi Singh;
Page : 246-254
Keywords : cloud computing; fog computing; data theft attack; cloud security; IT industry;
Abstract
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment. Day to day era of Cloud Computing growing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. Cloud computing is becoming the next revolution in the IT industry, providing centralize storage for internet data and network services that have the potential to bring data transmission performance, security and privacy and inefficient architecture to the next level. With these new computing paradigms arise new data security challenges. Data security is the biggest challenge faced by cloud storage. Existing mechanism in cloud storage have failed time to time for variety of reasons to maintain security. Cloud computing and storage solutions provide users and various enterprises with various capabilities to store and process their data in thirdparty data centers. We propose different technique for securing data in cloud storage with fog computing. We monitor data access in cloud environment and depends on user behavior technique, detects abnormal behavior of user data access patterns. When abnormal pattern is suspected and then verified using challenge question then we launch disinformation to the user with fog computing to the attacker this will protects against companies real data to be hacked.
Other Latest Articles
- ANALYSING THE PROBLEMS OF BUILDING ENERGY EFFICIENCY IN CHINA, AND RESOLUTION METHOD EXPLORATION, EXPERIMENTATION
- COMPUTER AIDED DIAGNOSIS OF LUNG DISEASES USING KNN CLASSIFIER
- IMPLEMENTATION AND EVALUATION OF A SEAWATER DESALINATION PILOT SYSTEM USING TWO-STAGE NANOFILTRATION
- AN APPROACH FOR SMART PARKING SYSTEM IOT
Last modified: 2018-06-08 19:42:00