首页    期刊浏览 2024年11月29日 星期五
登录注册

文章基本信息

  • 标题:Securing the cloud using Decoy Information Technology to preventing them from distinguishing the Real Sensitive data from fake Worthless data
  • 本地全文:下载
  • 作者:Etikala Aruna ; Dr. Ch GVN Prasad ; A. Malla Reddy
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2013
  • 卷号:3
  • 期号:9
  • 出版社:S.S. Mishra
  • 摘要:We propose a completely different approach to securing the cloud using decoy information technology, that we have come to call Fog computing. We use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from fake worthless data. The decoys, then, serve two purposes: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker with bogus information. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers. In most cases, the provider must ensure that their infrastructure is secure and that their clients' data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.Cloud computing offers potential benefits including cost savings and improved business outcomes for Australian government agencies. However, there are a variety of information security risks that need to be carefully considered. Risks will vary depending on the sensitivity of the data to be stored or processed, and how the chosen cloud vendor (also referred to as a cloud service provider) has implemented their specific cloud services
  • 关键词:Data Security; Data locality; Data integrity; Data separation; Data access; Data co nfidentiality; Data breaches; ;Network Security; Authentication and authorization; Web application security; Identity management process
国家哲学社会科学文献中心版权所有