z-logo
open-access-imgOpen Access
Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop
Author(s) -
K. Siva Krishna,
V. Srikanth
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.31.13407
Subject(s) - cloud computing , computer security , computer science , encryption , cloud computing security , insider , offensive , decoy , data security , key (lock) , cryptography , internet privacy , engineering , operations research , biochemistry , chemistry , receptor , political science , law , operating system
Cloud Computing has been intrinsically changing the way we utilize computers to keep and retrieve our personal & business data. With the advent of this emerging paradigm of computing, it arises the new security challenges. Existent cryptographic data security techniques i.e., encryption deteriorated in preventing data theft attacks once the key is compromised, especially those perpetrated by insiders. Cloud Security Alliance reckoned this threat as a significant danger of Cloud Computing. Although the majority of Cloud users are very much known of this risk, they are leftover with the only choice of trusting the cloud service provider, regards to their data protection. In this paper, we propose an alternate way to secure data on the cloud which is more efficient and secure by the concoction of user profile mapping using Hadoop framework and offensive decoy technology. 

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here