Data Protection and Malicious Insiders Detection in Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Cloud computing presents a huge data services to the user in an easy and comfortable way over the existing network. The main feature of the cloud service is that the data shared by the users are processed remotely with unknown machines which are not concern or own by the user. Data protection and security in cloud computing during rich application sharing have become challenging tasks. The proposal of paper introduces a new platform for cloud computing called data protection as a service (DPaaS), which significantly reduces the risk and thus provides data protection to the remote system. Here we areproposing a different approach for securing data in the cloud using offensive ‘decoy’ technology. The target is to monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challengingquestions, the system launches a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data.
Authors and Affiliations
Dammalapti Neelima, Jamil Noori
A Review On Blood Pressure Measuring Devices For Humans
There has been a rising trend in blood pressure patients in the world, due to variety of diseases and stress related issues. Apart, from that the technologies used today are very outdated and cumbersome, while the new...
Design of Fuzzy Controller For Bilateral Telemanipulator
The objective of a telerobotic system is to connect humans and robots in order to reproduce operator action at a distance. The telerobotic system consists of a ‘master’ robot, operated by a human arm, and a kinematica...
Design and Development of Multitasking Robot
A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multit...
A Digital Harmonic Rejection Mixer with Analog Harmonic Pre-suppression
A harmonic rejection mixer (HRM) employing analog harmonic pre-suppression and subsequent digital domain harmonic suppression is proposed and investigated. The analog harmonic pre-suppression relaxes the dynamic rang...
Hopfield Neural Network as Associated Memory with Monte Carlo- (MC-)Adaptation Rule and Genetic Algorithm for pattern storage
This paper describes the performance analysis of Hopfield neural networks by usinggenetic algorithm and Monte Carlo-(MC-) adaptation learning rule.A set of five objects has been considered as the pattern set. In the...