Detection & intimation of theft (Banking)
Chanakshi Niranjan Mendhekar , Prajwali Anil shinde, Apeksha harichandra begade, Shital durwas gayakwad, Dipali vasudev dharmik, Dr. Nilesh T. Gole
cloud computing, fog computing, decoy technique, insider theft attacks
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new Cyber Security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user Cyber Security in a Cloud environment
Article Details
Unique Paper ID: 160704

Publication Volume & Issue: Volume 10, Issue 1

Page(s): 1045 - 1047
Article Preview & Download

Share This Article

Conference Alert


AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2023

SWEC- Management


Last Date: 7th November 2023

Go To Issue

Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on

Social Media

Google Verified Reviews