Securing the Cloud Using Decoy Information Technology to Preventing Them From Distinguishing the Real Sensitive Data From Fake Worthless Data

Download Now
Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
The authors propose a completely different approach to securing the cloud using decoy information technology, that they have come to call Fog computing. They use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from fake worthless data. The decoys, then, serve two purposes: validating whether data access is authorized when abnormal information access is detected, and confusing the attacker with bogus information. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid).
Download Now

Find By Topic