Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Cloud Computing has been intrinsically changing the way we utilize computers to keep and retrieve our personal & business data. With the advent of this emerging paradigm of computing, it arises the new security challenges. Existent cryptographic data security techniques i.e., encryption deteriorated in preventing data theft attacks once the key is compromised, especially those perpetrated by insiders. Cloud Security Alliance reckoned this threat as a significant danger of Cloud Computing. Although the majority of Cloud users are very much known of this risk, they are leftover with the only choice of trusting the cloud service provider, regards to their data protection. In this paper, we propose an alternate way to secure data on the cloud which is more efficient and secure by the concoction of user profile mapping using Hadoop framework and offensive decoy technology.

Cite

CITATION STYLE

APA

Vamsi Krishna, K., & Srikanth, V. (2018). Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop. International Journal of Engineering and Technology(UAE), 7(2), 101–105. https://doi.org/10.14419/ijet.v7i2.31.13407

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free