International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
.
Follow Us On :
current issues
Volume-10,Issue-1  ( May, 2022 )
Statistics report
Sep. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 17
Paper Published : 157
No. of Authors : 403
  Journal Paper


Paper Title :
Secured Cloud Computing With Decoy Documents

Author :Dnyanesh S. Patil, Suyash S. Patil, Deepak P. Pote, Nilesh V. Koli

Article Citation :Dnyanesh S. Patil ,Suyash S. Patil ,Deepak P. Pote ,Nilesh V. Koli , (2014 ) " Secured Cloud Computing With Decoy Documents " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 43-45, Volume-2,Issue-2

Abstract : Cloud Computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. These shared, on-demand IT resources, are created and disposed of efficiently, are dynamically scalable through a variety of programmatic interfaces and Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructureas- a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. Our approach is to securing data in the cloud using offensive decoy & other various technologies. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.

Type : Research paper

Published : Volume-2,Issue-2


DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-1424   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 87
| Published on 2014-11-01
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-9,Issue-1(May, 2021)
The Conference World

JOURNAL SUPPORTED BY


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842