Reducing Inner Data Stealing Using Bogus Information Attacks in the Cloud Computing
Ravikiran Pawar1, Hrishikesh Bhapkar2, Sanket Domal3, Amol Bankar4, Vikrant Dudhale5

1Mr. Hrishikesh Bhapkar, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
2Mr. Sanket Domal, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
3Prof. Mr. Ravikiran Pawar, M.Tech, Department of Computer, Pune University, Parvatibai Genba Moze College of Engineering, Pune (Maharashtra), India.
4Mr. Vikrant Dudhale, Department of Computer, Pune University, PGMCO Engineering, Pune (Maharashtra), India.
5Mr. Amol Bankar, Department of Computer, Pune University, PGMCO Engineering, Pune (Maharashtra), India.
Manuscript received on 6 April 2014 | Revised Manuscript received on 17 April 2014 | Manuscript Published on 30 April 2014 | PP: 37-39 | Volume-3 Issue-11, April 2014 | Retrieval Number: K15790431114/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Computing is giving the new approach to use our computers to handle and storing the confidential information. Cloud Computing providing Services like Infrastructure as a Service <IaaS>, Platform as a Service <PaaS> and Software as a Service <SaaS> as well as we have to pay according to our use. The Cloud users can get access over it by the permission of Cloud provider without large investment. As access over Cloud is easily provided by Cloud providers therefore the Security Issues are more in it. The presenting Encryption Strategies are failed to preventing the Inner Data stealing. In this paper we are proposing the completely distinct approach to prevent the Inner data stealing attacks by using offensive decoy technology. When the user is going to access the data we monitoring over it. We are verifying the user by asking him some challenging security questions. Once the user is found that he is unauthorized then we directly applying the decoy information attack over attacker. This will helping us to stop the misuse of the genuine user’s data. Using certain functioning we can easily make the evidences against the attacker to stop this malicious activity.
Keywords: Cloud Computing, Decoy Information, Encryption, Malicious, Offensive Decoy Technology.

Scope of the Article: Cloud Computing