International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 6 | Year 2013 | Article Id. IJPTT-V3I10P102 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I10P102

Offensive Decoy Technology For Cloud Data Attacks


Lingaswami, G. Avinash Reddy

Citation :

Lingaswami, G. Avinash Reddy, "Offensive Decoy Technology For Cloud Data Attacks," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 6, pp. 23-27, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I10P102

Abstract

— Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime), the protection of the real user’s sensitive data on the cloud from the attacker (insider data theft attacker) and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information.

Keywords

- Enter key words or phrases in alphabetical order, separated by commas.

References

[1] M. Van Dijk and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing,” in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec’10. ”Berkeley, CA, USA”: ”USENIX Association”, 2010, pp. 1–8.
[2] J. A. Iglesias, P. Angelov, A. Ledezma, and A. Sanchis, “Creating evolving user behavior profiles automatically,” IEEE Trans. on Knowl. and Data Eng., vol. 24, no. 5, pp. 854–867, May 2012.
[3] F. Rocha and M. Correia, “Lucy in the sky without diamonds: Stealing confidential data in the cloud,” in Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, ser. DSNW ’11. Washington, DC, USA: IEEE Computer Society, 2011, pp. 129–134.
[4] M. B. Salem and S. J. Stolfo, “Modeling user search behavior for masquerade detection,” in Proceedings of the 14th international conference on Recent Advances in Intrusion Detection, ser. RAID’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 181–200.
[5] S. et al, “Decoy document deployment for effective masquerade attack detection,” in Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment, ser. DIMVA’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 35–54.
[6] D. Godoy and A. Amandi, ―User profiling in personal information agents: a survey,‖ Knowl. Eng. Rev., vol. 20, no. 4, pp. 329–361, Dec. 2005.
[7] D. Godoy, ―User profiling for web page filtering,‖ IEEE Internet Computing, vol. 9, no. 4, pp. 56–64, Jul. 2005.
[8] Cloud Security Alliance, ―Top Threat to Cloud Computing V1.0,‖ March 2010. [Online]. Available: https://cloudsecurityalliance.org/topt hreats/csathreats.v1.0.pdf
[9] P. Allen, ―Obama’s Twitter password revealed after french hacker arrested for breaking into U.S. president’s account,‖ March 2010. [Online].Available: http://www.dailymail.co.uk
/news/article-1260488/Barack- Obamas-Twitter-passwordrevealed-French-hacker-arrested.html
[10] M. Ben-Salem and S. J. Stolfo, ―Combining a baiting and a user search profiling techniques for masquerade detection,‖ in Columbia University Computer Science Department, Technical Report # cucs-018-11, 2011.[Online].Available: https://mice.cs. columbia.edu/getTechreport.php?techreportID=1468