Alleviate Insider Statistics Pilferage Blitz in the Cloud
Keywords:Cloud Computing, decoy technology, attacker, data security
Cloud computing allows to store our personal and business information. you can quickly spin up resources as you need them, deploying hundreds or even thousands of servers in minutes. We propose an approach for data security in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. At the point when unapproved access is suspected and after thatconfirmed utilizing challenge questions, it dispatches a disinformation assault by returning a lot of imitation data to the assailant. This secures against the abuse of the client’s genuine information
How to Cite
Copyright (c) 2021 Journal of Research Proceedings
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.