Preclusion of Insider Data Theft Attacks in the Cloud

Cloud computing is the fastest growing technology in the software market. The authors are using clouds from Google drive to social networking every day. It is result of evolution and adoption of existing technologies. With these new computing and communications paradigms arise new data security challenges. Various protection mechanism techniques like encryption have failed in preventing attacks carried out by cloud service provider employees i.e. insider attack. To solve such issues, they proposed a new approach for securing data in the cloud using decoy files.

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Topic: Cloud Date Added: Jan 2015 Format: PDF

Find By Topic