Data Protection and Malicious Insiders Detection in Cloud

Abstract

Cloud computing presents a huge data services to the user in an easy and comfortable way over the existing network. The main feature of the cloud service is that the data shared by the users are processed remotely with unknown machines which are not concern or own by the user. Data protection and security in cloud computing during rich application sharing have become challenging tasks. The proposal of paper introduces a new platform for cloud computing called data protection as a service (DPaaS), which significantly reduces the risk and thus provides data protection to the remote system. Here we areproposing a different approach for securing data in the cloud using offensive ‘decoy’ technology. The target is to monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challengingquestions, the system launches a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data.

Authors and Affiliations

Dammalapti Neelima, Jamil Noori

Keywords

Related Articles

A Review On Blood Pressure Measuring Devices For Humans

There has been a rising trend in blood pressure patients in the world, due to variety of diseases and stress related issues. Apart, from that the technologies used today are very outdated and cumbersome, while the new...

Design of Fuzzy Controller For Bilateral Telemanipulator

The objective of a telerobotic system is to connect humans and robots in order to reproduce operator action at a distance. The telerobotic system consists of a ‘master’ robot, operated by a human arm, and a kinematica...

Design and Development of Multitasking Robot

A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multit...

A Digital Harmonic Rejection Mixer with Analog Harmonic Pre-suppression

A harmonic rejection mixer (HRM) employing analog harmonic pre-suppression and subsequent digital domain harmonic suppression is proposed and investigated. The analog harmonic pre-suppression relaxes the dynamic rang...

Hopfield Neural Network as Associated Memory with Monte Carlo- (MC-)Adaptation Rule and Genetic Algorithm for pattern storage

This paper describes the performance analysis of Hopfield neural networks by usinggenetic algorithm and Monte Carlo-(MC-) adaptation learning rule.A set of five objects has been considered as the pattern set. In the...

Download PDF file
  • EP ID EP27640
  • DOI -
  • Views 314
  • Downloads 4

How To Cite

Dammalapti Neelima, Jamil Noori (2013). Data Protection and Malicious Insiders Detection in Cloud. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27640