HOME INDEXING CALL FOR PAPERS JOURNAL POLICY MANUSCRIPT CURRENT ARCHIVES EDITORIAL BOARD
   
TITLE : Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology  
AUTHORS : Ms.B.Ankayarkanni                 
DOI : http://dx.doi.org/10.18000/ijisac.50145  
ABSTRACT :

The eternal way for using computer in the way of cloud computing used to store our personal and private organization information. In this new technology for communication computing there exist many challenges for securing data. There are many data protection techniques existing which uses encryption technique that prevents data attacks from the insider in provider of cloud. To secure data from an offensive decoy attack that access data from cloud storage. To monitor data access which suspects and verify attacks send large amounts of decoy information. They also can misuse real user data which evidences the level of data security provided in cloud security. In this model we propose approach for securing data using fog computing. This technique used for launching disinformation attacks against malicious insiders which prevents them from differentiating the sensitive data provided from the fake useless data. This process alleviates the malicious insider from the cloud storage area who uses offensive technique for attacking.  

Keywords: Cloud Computing, decoy technology, disinformation attack, data protection

 
  Download Full Paper
 
Copyrights ©Sathyabama Institute of Science and Technology (Deemed to be University).
Powered By: Infospace Technologies