Cloud

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

Date Added: Mar 2012
Format: PDF

Cloud computing promises to significantly change the way the people use computers and access and store their personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. The authors propose a different approach for securing data in the cloud using offensive decoy technology. They monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, they launch a disinformation attack by returning large amounts of decoy information to the attacker.