A Secure Framework for Mollifying Attacks in Cloud
||International Journal of Computer Trends and Technology (IJCTT)|
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : Y. Lakshmi Kanth , Bhaludra Raveendranadh Singh , S.Sunanda , Moligi Sangeetha|
Y. Lakshmi Kanth , Bhaludra Raveendranadh Singh , S.Sunanda , Moligi Sangeetha. "A Secure Framework for Mollifying Attacks in Cloud". International Journal of Computer Trends and Technology (IJCTT) V16(5):204-207, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
The cloud computing becoming a major platform for storing the data from various organizations, instead of storing their data with them store in the cloud with this reducing the money as well as work load. We use computers to store and access the personal data as well as business information in the cloud. By this new communication and computing pattern new security issues will arise. The present data encryption techniques are not providing security from data hackers to theft the data. Especially those are performed by insider cloud provider. We introducing a new technique for providing security in the cloud, that’s a decoy technique, means fault data. Always we will watch data access in the cloud, for detecting abnormal data access, when unauthorized user is noticed will ask some security questions for verifying, we will provide a large amount of decoy data to protect the original data from the attackers, Experiments accompanied in a local file setting provide proof that this method may provide unmatched levels of user data security in a Cloud environment.
 Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,”March2010.[Online].Available: https://cloudsecurityalliance.org/topthreats/csathreats. v1.0.pdf
 M. Arrington, “In our inbox: Hundreds of confidential twitter documents,” July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential- twitter-documents/
 D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online]. Available: http://venturebeat.com/2010/03/24/french-hacker-wholeaked- twitter-documents-to-techcrunch-is-busted/
 D. Danchev, “ZDNET: french hacker gains access to twitter’s admin panel,” April 2009. [Online]. Available: http://www.zdnet.com/blog/security/french-hacker-gains access-totwitters- admin-panel/3292
 P. Allen, “Obama’s Twitter password revealed after french hacker arrested for breaking into U.S. president’s account,” March 2010. [Online]. Available: http://www.dailymail.co.uk/news/article-1260488/Barack- Obamas-Twitter-password-revealed-French-hacker arrested.html
 F. Rocha and M. Correia, “Lucy in the sky without diamonds: Stealing confidential data in the cloud,” in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV ’11, June 2011.
Cloud Computing, decoy, abnormal data, accompanied