Attacks on Cloud Data: A Big Security Issue
Keywords:
Cloud Computing, Decoy, Fog computingAbstract
Cloud computing is latest trend in Computing World. Every organization prefers cloud for their services, large amount of personal and professional information stored on cloud. Data theft is major security challenge on cloud because of that a person scared to us cloud for personal and professional information. Cloud Computing use various type of security like Data Security, Storage Security, and Network Security etc. But then after data theft/data hacking activities happening on cloud. If 3rd world war situations will raise then Cloud can be part of that because of these data hacking activities. Existing Technology like Encryption and password techniques are not able to prevent it. By this research paper, we want to introduce a new phase of security that is – D-Phase security with decoy technology to prevent inside data theft and to identify hacker. We can call it D- phase security with Fog computing.
References
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6227695
http://docplayer.net/6393704-Defining-the-cloud-battlefield.html
M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online] Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential-twitter-documents
D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online] Available: http://venturebeat.com/2010/03/24/french-hacker-wholeaked-twitter-documents-to-techcrunch-is-busted/
http://www.idtheftcenter.org/ITRC-Surveys-Studies/2015databreaches.html
D.C.Saste,P.V.Madhwai,N.B.Lokhande and V.N.Chothe FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology
http://ijsae.in/ijsaeems/index.php/ijsae/article/view/697
Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online] Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.