http://www.ijrcct.org/index.php/ojs/article/view/555/pdf

Abstract

Cloud computing provides a huge data services to the user in an easy and comfortable way over the internet. We presenting a new platform for cloud computing called Data Protection as a Service which is significantly reduces the risk and provide data protection to the remote system. Also we proposes a different approach for securing data in the cloud by using offensive decoy technology. When unauthatication access is suspectes and then verification using challenge questions we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data.

Authors and Affiliations

Suresh Kathi, Mamidi Veerakumari

Keywords

Related Articles

A Study of Efforts Done by Computing Industries for Green Computing

Green computing is one of the biggest concepts these days. The first thing that may come to mind when we think of “Green Computing” is simply using less electricity, but there’s a lot more to that. The challenge of g...

Systematic Detection And Resolution Of Firewall Policy Anomalies

In this paper the problem of discovering the set of troublesome rules in a large firewall policy is investigated and consequently eliminating or resolving them. all the rules in the policy are consistent and can be r...

Implementation of Wireless Sensor Hub to Support Protocols Interoperability

This Paper presents a wireless sensor hub which supports protocols interoperability such as MiWi and WiFi protocol. The wireless sensor network/hub (WSN) is a combination of sensing, computation, and communication in...

Person Authentication by voice and image using ANFIS and Shifted MFCC

In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...

Video Frame Retrieval Using Effective Query Processing

Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...

Download PDF file
  • EP ID EP27807
  • DOI -
  • Views 427
  • Downloads 1

How To Cite

Suresh Kathi, Mamidi Veerakumari (2014). http://www.ijrcct.org/index.php/ojs/article/view/555/pdf. International Journal of Research in Computer and Communication Technology, 3(1), -. https://europub.co.uk/articles/-A-27807