Offensive Decoy Technology for Cloud Data Attacks

Download Now
Provided by: International Journal of P2P Network Trends and Technology(IJPTT)
Topic: Cloud
Format: PDF
Cloud computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of the cloud users are from the internet. The users those who have valid credentials on the cloud are called insiders. In the security perspective, all the remote users are to be treated as attackers. The security systems should ensure that the remote user is not an attacker.
Download Now

Find By Topic