Offensive Decoy Technology For Cloud Data Attacks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 10
Abstract
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime), the protection of the real user’s sensitive data on the cloud from the attacker (insider data theft attacker) and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.
Authors and Affiliations
Lingaswami , G. Avinash Reddy
Adaptive Neural Networks and Random Distribution for Cancer Tissue Detection and Localization with Random multivariable
In this paper a novel approach is described to perform detection of Cancer Tissues by directly modeling the statistical characteristics of the Cancer Cells. This approach allows us to represent Cancer Tissue Acqui...
An Empirical Study of Emotional Musical Influence on Face Using the Local Binary Pattern (LBP) Approach
In This Empirical paper, we had observed that indian classical raga music such as raag Khamaj and raag Darbrai evokes feelings and emotions. Raag Khamaj produces peace happiness, cheerfulness and Raag Darbari...
A Survey of Layer Specific and Cryptographic primitive attacks and their countermeasures in MANETS
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. In MANET nodes which are within the range of each other can connect dir...
Future Research Challenges of Peer-to-Peer Systems
PCs have become much more powerful, and they are able to handle the data processing locally rather than on central servers. Because of this, peer-to-peer computing can now occur when individual computers bypass central s...
A Study on Network Security Aspects and Attacking Methods
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better u...