Offensive Decoy Technology For Cloud Data Attacks

Abstract

Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime), the protection of the real user’s sensitive data on the cloud from the attacker (insider data theft attacker) and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.

Authors and Affiliations

Lingaswami , G. Avinash Reddy

Keywords

Related Articles

Offensive Decoy Technology For Cloud Data Attacks

Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...

Compressed Sensing Based Image Encoding Technique for Wireless Sensor Networks

The Wireless Sensor Network (WSN) is the one, which generally consists of cameras themselves, which have some local image processing, communication and storage capabilities, and one or more central computers, where image...

 Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks

 A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...

 A MediNet for staying connected in a Mobile Healthcare System

 A mobile healthcare system is a network includes a collection of number of components that includes patients and their health-care providers. In this system it is important that the patient to remain connected at a...

Future Research Challenges of Peer-to-Peer Systems

PCs have become much more powerful, and they are able to handle the data processing locally rather than on central servers. Because of this, peer-to-peer computing can now occur when individual computers bypass central s...

Download PDF file
  • EP ID EP104469
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Lingaswami, G. Avinash Reddy (2013). Offensive Decoy Technology For Cloud Data Attacks. International Journal of P2P Network Trends and Technology(IJPTT), 3(10), 430-435. https://europub.co.uk/articles/-A-104469