Offensive Decoy Technology For Cloud Data Attacks

Abstract

Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime), the protection of the real user’s sensitive data on the cloud from the attacker (insider data theft attacker) and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.

Authors and Affiliations

Lingaswami , G. Avinash Reddy

Keywords

Related Articles

 Adaptive Neural Networks and Random Distribution for Cancer Tissue Detection and Localization with Random multivariable

 In this paper a novel approach is described to perform detection of Cancer Tissues by directly modeling the statistical characteristics of the Cancer Cells. This approach allows us to represent Cancer Tissue Acqui...

 An Empirical Study of Emotional Musical  Influence on Face Using the Local Binary Pattern (LBP) Approach

 In This Empirical paper, we had observed that indian classical raga music such as raag Khamaj and raag Darbrai evokes feelings and emotions. Raag Khamaj produces peace happiness, cheerfulness and Raag Darbari...

 A Survey of Layer Specific and Cryptographic primitive attacks and their countermeasures in MANETS

 Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. In MANET nodes which are within the range of each other can connect dir...

Future Research Challenges of Peer-to-Peer Systems

PCs have become much more powerful, and they are able to handle the data processing locally rather than on central servers. Because of this, peer-to-peer computing can now occur when individual computers bypass central s...

 A Study on Network Security Aspects and Attacking Methods

 Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better u...

Download PDF file
  • EP ID EP104469
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Lingaswami, G. Avinash Reddy (2013). Offensive Decoy Technology For Cloud Data Attacks. International Journal of P2P Network Trends and Technology(IJPTT), 3(10), 430-435. https://europub.co.uk/articles/-A-104469