Alleviating Internal Data Theft Attacks by Decoy Technology in Cloud

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Cloud
Format: PDF
Cloud Computing enables several users to share common computing resources, and to access and store their personal and business information. The accessing includes so many things as well as can keep their private and industrial information. These new thoughts and innovations have pro's at the same time con's too. And there is new security challenges has been a raised. The increase in the number of cloud users are from the World Wide Web users means of internet. The users who have prospective valid credentials which contain username and password are treated as insiders. In security perspective, all the remote users are known as attackers.
Download Now

Find By Topic