Preclusion of Insider Data Theft Attacks in the Cloud

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
Topic: Cloud
Format: PDF
Cloud computing is the fastest growing technology in the software market. The authors are using clouds from Google drive to social networking every day. It is result of evolution and adoption of existing technologies. With these new computing and communications paradigms arise new data security challenges. Various protection mechanism techniques like encryption have failed in preventing attacks carried out by cloud service provider employees i.e. insider attack. To solve such issues, they proposed a new approach for securing data in the cloud using decoy files.

Find By Topic