Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)Publication Date: 2016-01-01
Authors : Kalyani Gagare; Saniksha Bhusappa; Anand Moon; Subhash Kursunge;
Page : 393-394
Keywords : Cloud computing; Data privacy; accountability; decoy information technology; Identity management process; Authentication and authorization; Data separation; Data access; Data confidentiality;
Abstract
Cloud computing allows us for share and access our personal and business data. With this technology the communication becomes faster. But when a user share his personal data, he will start worrying about the security. Existing data security paradigms such as encryption have failed in protect data theft attacks, especially those committed by an insider to the cloud service provider. To overcome this problem, We propose a different approach for providing the security for data in the cloud by using offensive decoy technology(ODT). In this Technic we observe data access in the cloud and detect anomalous data access patterns. When unofficial access is found and then verified using challenge questions, we launch a deception attack by returning large amounts of decoy information to the attacker. This protects against the illegal use of the user�s real data. Experiments conducted in a local file setting provide indication that this approach may provide extraordinary levels of user data security in a Cloud environment.
Other Latest Articles
- A Review on Pattern Recognition with Offline Signature Classification and Techniques
- Synthesis of Tolerances for Spacecraft Mechanism
- Introduction to Multi-Objective Clustering Ensemble
- Piping For Cooling Water Circulation between Cooling Tower and Condenser
- Design of A REAL TIME Arduino Controlled Wireless Monitoring System for Solar Power Plant
Last modified: 2016-01-07 18:15:15