Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop

  • Authors

    • K Vamsi Krishna
    • V Srikanth
    2018-05-29
    https://doi.org/10.14419/ijet.v7i2.31.13407
  • Data security, data access, malicious insider, decoy, intrusion detection, fog computing, user profiling, hadoop, cluster computing, multi-clouds, machine learning, naïve bayes, big data processing.
  • Cloud Computing has been intrinsically changing the way we utilize computers to keep and retrieve our personal & business data. With the advent of this emerging paradigm of computing, it arises the new security challenges. Existent cryptographic data security techniques i.e., encryption deteriorated in preventing data theft attacks once the key is compromised, especially those perpetrated by insiders. Cloud Security Alliance reckoned this threat as a significant danger of Cloud Computing. Although the majority of Cloud users are very much known of this risk, they are leftover with the only choice of trusting the cloud service provider, regards to their data protection. In this paper, we propose an alternate way to secure data on the cloud which is more efficient and secure by the concoction of user profile mapping using Hadoop framework and offensive decoy technology.

     

  • References

    1. [1] Yusop ZM & Abawajy JH, “Analysis of insiders attack mitigation strategiesâ€, Procedia-Social and Behavioral Sciences, Vol.129, (2014), pp.611-618.

      [2] Shiyana S, Bhandare A & Yelwande D, “Fog Computing: Software decoys for insider threatâ€, SSRG International Journal of Computer Science and Engineering, (2015).

      [3] Botta A, De Donato W, Persico V & Pescapé A, “Integration of cloud computing and internet of things: a surveyâ€, Future Generation Computer Systems, (2016), pp.684-700.

      [4] Cloud Security Alliance, “Top Threats to Cloud Computing Plus: Industry Insightsâ€, (2016).

      https://cloudsecurityalliance.org/group/top-threats/, 2016.

      [5] CERT, “Insider Threatâ€.

      https://www.us-cert.gov/taxonomy/term/58/all.

      [6] IBM, “Cyber Security Intelligence Indexâ€, (2015).

      Essextec.com-Cyber-Security-Intelligence- 2015.

      [7] The Verge, “Yahoo says all 3 billion user accounts were impacted by 2013 security breachâ€, (2017).

      https://theverge.com/2017/10/3/16414306/yahoo-security-data-breach-3-billion-verizon, 2017.

      [8] Wikipedia, “iCloud leaks of celebrity photosâ€,

      https://en.wikipedia.org/wiki/ICloud_leaks_of_celebrity_photos.

      [9] New York Post, “Michelle Obama’s passport leaked by a hackerâ€, (2016).

      https://nypost.com/2016/09/22/michelle-obamas-passport-published-online-by-hacker

      [10] Francisco R & Miguel C, “Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloudâ€, 1st International Workshop on Dependability of Clouds, Data Centers, and Virtual Computing Environments, (2011).

      [11] Stolfo SJ, Salem MB & Keromytis AD, “Fog computing: Mitigating insider data theft attacks in the cloudâ€, IEEE Symposium on Security and Privacy Workshops (SPW), (2012), pp.125-128.

      [12] Reena KM, Yadav SK & Bajaj NK, “Security Implementation in cloud computing Using User Behaviour Profiling and Decoy Technologyâ€, International Conference on Inventive Communication and Computational Technologies, (2017).

      [13] Srujana R & Murty GSN, “Evaluating the Effectiveness of Classification Algorithms Based on CCIâ€, International Journal of Innovative Research in Science, Engineering, and Technology.

      [14] Apache, “Hadoop Documentationâ€.

      https://hadoop.apache.org/docs/r1.2.1/hdfs_design.html.

  • Downloads

  • How to Cite

    Vamsi Krishna, K., & Srikanth, V. (2018). Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop. International Journal of Engineering & Technology, 7(2.31), 101-105. https://doi.org/10.14419/ijet.v7i2.31.13407