Paper Title :Secured Cloud Computing With Decoy Documents
Author :Dnyanesh S. Patil, Suyash S. Patil, Deepak P. Pote, Nilesh V. Koli
Article Citation :Dnyanesh S. Patil ,Suyash S. Patil ,Deepak P. Pote ,Nilesh V. Koli ,
(2014 ) " Secured Cloud Computing With Decoy Documents " ,
International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) ,
pp. 43-45,
Volume-2,Issue-2
Abstract : Cloud Computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of
abstracted hardware and software accessed over the Internet. These shared, on-demand IT resources, are created and
disposed of efficiently, are dynamically scalable through a variety of programmatic interfaces and Cloud computing is a
general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into
three categories: Infrastructureas- a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).. With
these new computing and communications paradigms arise new data security challenges. Existing data protection
mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the
cloud provider.
Our approach is to securing data in the cloud using offensive decoy & other various technologies. We monitor data access in
the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge
questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects
against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach
may provide unprecedented levels of user data security in a Cloud environment.
Type : Research paper
Published : Volume-2,Issue-2
DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-1424
View Here
Copyright: © Institute of Research and Journals
|
 |
| |
 |
PDF |
| |
Viewed - 91 |
| |
Published on 2014-11-01 |
|