Offensive Decoy Technology For Cloud Data Attacks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 10
Abstract
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime), the protection of the real user’s sensitive data on the cloud from the attacker (insider data theft attacker) and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.
Authors and Affiliations
Lingaswami , G. Avinash Reddy
Methodology for Artificial Immune Systems and Immune Pathology
Artificial immune system (AIS) mimics the superior properties of biological immune system and provides an effective method in intelligent computing and intelligent system designing. But the disease-causing mechanis...
Addressing Trust Issues in Cloud Computing
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate trust issues in cloud computing. Data is the most valuable of clients (or) company’s asset; it must be protected with mu...
Artificial Intelligent Bionic Devices and Robotic Controls
Functionality and design of a bionic robot arm consisting of three joints driven by elastic and compliant actuators derived from biologically inspired principles are presented. In the first design standa...
Information at Your Fingertips Anywhere Anytime Anyway (A3) MCC – Survey
The cloud means total cost of ownership to build and maintain the datacenter infrastructure which includes both hard and soft related costs. An accurate comparison requires knowledge of all available over the life of the...
Efficient Patterns Using Hidden Web Trajectory Concept
Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based...