This paper is published in Volume-4, Issue-2, 2018
Area
Computer Engineering
Author
Ankit Choudhary, Tushar Nikam, Rajkumar Singh, Yogita Kawle, Abhijit Tambe
Org/Univ
Terna Engineering College, Navi Mumbai, Maharashtra, India
Pub. Date
03 April, 2018
Paper ID
V4I2-1562
Publisher
Keywords
Cloud computing, Security, User profiling behavior, Decoy technology.

Citationsacebook

IEEE
Ankit Choudhary, Tushar Nikam, Rajkumar Singh, Yogita Kawle, Abhijit Tambe. Fog computing: Mitigating insider data theft attacks in the cloud, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Ankit Choudhary, Tushar Nikam, Rajkumar Singh, Yogita Kawle, Abhijit Tambe (2018). Fog computing: Mitigating insider data theft attacks in the cloud. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.

MLA
Ankit Choudhary, Tushar Nikam, Rajkumar Singh, Yogita Kawle, Abhijit Tambe. "Fog computing: Mitigating insider data theft attacks in the cloud." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.

Abstract

Cloud computing guarantees to considerably amendment the manner we tend to use computers and access and store our personal and business data. With this new computing and communications, paradigms arise new information security challenges. Existing information protection mechanisms like secret writing have unsuccessful in preventing information larceny attacks, particularly those perpetrated by an associate degree business executive to the cloud supplier. we tend to propose a special approach for securing information within the cloud victimization offensive decoy technology. We tend to monitor information access within the cloud and observe abnormal information access patterns. once unauthorized access is suspected and so verified victimization challenge queries, we tend to launch a misinformation attack by returning giant amounts of decoy data to the assailant. This protects against the misuse of the user’s real information. Experiments conducted in a very native file setting offer proof that this approach might offer unprecedented levels of user information security in a very Cloud atmosphere.