Alleviate Insider Statistics Pilferage Blitz in the Cloud


  • Shruthi S


Cloud Computing, decoy technology, attacker, data security


Cloud computing allows to store our personal and business information. you can quickly spin up resources as you need them, deploying hundreds or even thousands of servers in minutes. We propose an approach for data security in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. At the point when unapproved access is suspected and after thatconfirmed utilizing challenge questions, it dispatches a disinformation assault by returning a lot of imitation data to the assailant. This secures against the abuse of the client’s genuine information




How to Cite

Shruthi S. (2021). Alleviate Insider Statistics Pilferage Blitz in the Cloud. Journal of Research Proceedings, 1(2), 312–321. Retrieved from