A Review on User Behavior Profiling and Decoy Technology in Cloud Computing

Authors

  • Sonam Satyanarayan Tiwari  M.Tech Scholar, Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology Nagpur, Maharashtra, India
  • Prof. Roshani Talmale  Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology Nagpur, Maharashtra, India

Keywords:

Cloud Computing, Encryption, Security, Decoy Technology, User Profiling Behavior.

Abstract

Now a day's information technology growing vastly to provide users with lots of services but it will lead to security problems. One of them is secret key file. Password files have a great deal of security issue that has influenced a great many clients as well the same number of organizations. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Cloud computing significantly modifies the way we use computers and guarantees access and storage of our personal data and business information. These new computing and communication models face new data security challenges. To keep sensitive userdata confidential against untrusted servers, existing solutions usually apply cryptographic methods like encryption by disclosing data decryption keys only to authorized users. But like encryption fail to prevent data from the attacks of theft, especially in the cloud service provider in case key is lost by user or owner. We propose a different approach to overcome these problems in the cloud using decoy technology and user behavior profiling. The users using the Cloud are trapped and their access patterns are recorded. Every User has a unique profile which is monitored and updated. We monitor data access in the cloud by the users and detect abnormal data entry patterns. When unauthorized user try to access or is detected and challenged by challenge questions, we begin the wrong attack by returning the bulk of the information to the attacker. This protects users' real data from being misused.

References

  1. S. E. Coull, J. Branch, B. Szymanski, and E. Breimer. Intrusion detection: A bioinformatics approach. In Proceedings of the 19th Annual Computer Security Applications Conference, pages 24{33, 2001.
  2. S. E. Coull and B. K. Szymanski. Sequence alignment for masquerade detection. Computational Statistics and Data Analysis, 52(8):4116{4131, 2008.
  3. R. A. Maxion and T. N. Townsend. Masquerade detection using truncated command lines. In DSN '02: Proceedings of the 2002 International Conference on Dependable Systems and Networks, pages 219{228. IEEE Computer Society, 2002.
  4. R. A. Maxion and T. N. Townsend. Masquerade detection augmented with error analysis. IEEE Transactions on Reliability, 53(1):124{147, 2004.
  5. M. Oka, Y. Oyama, H. Abe, and K. Kato. Anomaly detection using layered networks based on eigen co-occurrence matrix. In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004.
  6. M. Oka, Y. Oyama, and K. Kato. Eigen co-occurrence matrix method for masquerade detection.
  7. K. H. Yung. Using self-consistent naive bayes to detect masqueraders. In PAKDD'08: Proceedings of the 8th Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 329{340, 2004.
  8. K. Wang and S. J. Stolfo. One-class training for masquerade detection. In Proceedings of the 3rd IEEE Workshop on Data Mining for Computer Security, 2003.
  9. Anthony Bisong and M. Rahman, “An Overview of the Security Concerns In Enterprise Cloud Computing,” International Journal of Network Security & Its Applications, Vol. 3, pp. 30-45, 2011.
  10. Open Security Architecture Available: http://www.opensecurityarchitecture.org.
  11. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS ’09, 2009.
  12. Provable Data Possession at Untrusted Stores∗Giuseppe Ateniese† Randal Burns† Reza Curtmola†Joseph Herring† Lea Kissner‡ Zachary Peterson† Dawn Son
  13. Chen Danwei, Huang Xiuli, and RenXunyi, “Access Control of Cloud Service Based on UCON”, 2011, Nanjing University of posts & Telecommunications
  14. Shantanu Pal, SunirmalKhatua “A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security”, 2011, IEEE
  15. Cloud Hooks: Security and Privacy Issues in Cloud Computing
  16. B. M. Bowen and S. Hershkop, “Decoy Document Distributor: http://sneakers.cs.columbia.edu/ids/fog/,” 2009. Online. Available: http://sneakers.cs.columbia.edu/ids/FOG/
  17. Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology
  18. Dropbox, “Dropbox help - where does Dropbox store everyone’s data? ” https://www.dropbox.com/ help/7/en, accessed on March 15, 2013.
  19. J. Ciancutti, “Four Reasons We Choose Amazon’s Cloud as Our Computing Platform,” http://techblog.netflix.com/2010/12/four-reasons-we-choose-amazons-cloud-as.html, accessed on March 15, 2013.
  20. G.Rajesh Babu, Ananth Kumar ,”Security In Inter Cloud Data Transfer” International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN: 2347-5552, Volume-2, Issue-5, September-2014.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Sonam Satyanarayan Tiwari, Prof. Roshani Talmale, " A Review on User Behavior Profiling and Decoy Technology in Cloud Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 2, pp.122-129, March-April-2019.