Downloads

Pruning the Cloud Internal Data Stealing By Treachery Attacks

Authors

Shobha Agasibagil, Mr. G.Lingana Gowda1

Abstract

Cloud Computing is internet based computing provide computing services those are data, application, software and computing, these computing services are delivered to local devices through internet. To store and share personal and business information and access cloud computing enables multiple users. Insider means, users those who have valid authority on the cloud. Attackers are treated as remote users in the security perspective. If the attacker are not a remote users then that should be checked by the security systems. If a authorized user’s access details are stolen by an attacker can enter and access the cloud as a valid user. Distinguishing the real data of user and the attacker data, for this decoy information technology are used in the field of cloud computing. For detection of abnormal access of information and validating whether data access then it confuses the attacker with bogus information.

Article Details

Published

2017-12-30

Section

Articles

How to Cite

Pruning the Cloud Internal Data Stealing By Treachery Attacks. (2017). International Journal of Engineering and Computer Science, 3(05). http://www.ijecs.in/index.php/ijecs/article/view/512