Identifying Data Theft Attack Using Fog Computing

Cloud computing promises to significantly change the way the authors use computers and access and store their personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. They propose a different approach for securing data in the cloud using offensive decoy technology. They monitor data access in the cloud and detect abnormal data access patterns.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
Engineering Research Publication
Topic:
Security
Format:
PDF