Offensive Decoy Technology For Cloud Data Attacks

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2013 by IJPTT Journal
Volume-3 Issue-6                           
Year of Publication : 2013
 

Citation

Lingaswami, G. Avinash Reddy."Offensive Decoy Technology For Cloud Data Attacks ". International Journal of P2P Network Trends and Technology (IJPTT), V3(6):23 - 27  Nov - Dec 2013, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

— Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime), the protection of the real user’s sensitive data on the cloud from the attacker (insider data theft attacker) and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.

References

[1] M. Van Dijk and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing,” in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec’10. ”Berkeley, CA, USA”: ”USENIX Association”, 2010, pp. 1–8.
[2] J. A. Iglesias, P. Angelov, A. Ledezma, and A. Sanchis, “Creating evolving user behavior profiles automatically,” IEEE Trans. on Knowl. and Data Eng., vol. 24, no. 5, pp. 854–867, May 2012.
[3] F. Rocha and M. Correia, “Lucy in the sky without diamonds: Stealing confidential data in the cloud,” in Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, ser. DSNW ’11. Washington, DC, USA: IEEE Computer Society, 2011, pp. 129–134.
[4] M. B. Salem and S. J. Stolfo, “Modeling user search behavior for masquerade detection,” in Proceedings of the 14th international conference on Recent Advances in Intrusion Detection, ser. RAID’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 181–200.
[5] S. et al, “Decoy document deployment for effective masquerade attack detection,” in Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment, ser. DIMVA’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 35–54.

Keywords

- Enter key words or phrases in alphabetical order, separated by commas.