High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Instigate Security in Cloud Computing using Profile of User Behavior and Decoy Technology

Author(s):

K. Shanthi , PHD Research Scholar, PRIST University,Thanjavir

Keywords:

Security, Cloud Computing, Decoy Technology, User Behavior Profiling, Denial of Service

Abstract

Cloud computing refers a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is a place for the users to host their web services such as web hosting and cloud storage. This has attracted the hackers to steal the business data, such as daily sales, profit reports, financial reports etc. The types of cloud attacks are malware injection attack, wrapping attack, SQL injection, authentication attack and Denial of Service. The “hot button” issues surrounding cloud computing relate to storing and securing data, and monitoring the use of the cloud by the service providers. These issues are generally attributed to slowing the deployment of cloud services. These challenges can be addressed, for example, by storing the information internal to the organization, but allowing it to be used in the cloud. For this to occur, though, the security mechanisms between organization and the cloud need to be robust. There are numerous algorithms implemented to secure data. User behavior profiling and decoy technology provide a better way to secure data on a server, which is more efficient and secure. There are many algorithms on user behavior profiling and decoy technology but no one can find the problem is that efficiently delivering the decoy file in such a way the intruder not able to recognize the difference between the genuine and decoy file, once the anonymous behavior of the user identified. Proposed a system in which we are going to use the two techniques together i.e user behavior profiling and decoy technology.

Other Details

Paper ID: IJSRDV6I120426
Published in: Volume : 6, Issue : 12
Publication Date: 01/03/2019
Page(s): 559-561

Article Preview

Download Article