Data Theft Protection In Cloud Storage Using Three Layer Architecture Using Decoy Documents

  • D.Sai Maneesha, Dr.S.Jessica Saritha,

Abstract

Recent years witness the development of cloud computing technology. With the explosive growth of unstructured data, cloud storage technology gets more attention and better development. Cloud computing promises to significantly change the way to use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server.  Proposed system provides small part of data in local machine and fog server in order to protect the privacy. Moreover, based on computational intelligence, this algorithm can compute the distribution proportion stored in cloud, fog, and local machine, respectively.   But here data is divided into blocks and stored in multiple systems, access data blocks and combining is tremendous work. In order to solve this problem, Proposing a three-layer storage framework based on fog computing. The proposed framework can both take full advantage of cloud storage and protect the privacy of data. Propose a different approach for securing data in the cloud using offensive decoy technology. Monitors data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, to protect data, launching a disinformation attack by returning large amounts of decoy information to the attacker. Proposing Enhanced A Three-Layer Privacy Preserving Cloud Storage using multi cloud servers and multi fog servers, an efficient, distributed and scalable data processing system through Multi Cloud Server Security.

Published
2020-10-01
How to Cite
D.Sai Maneesha, Dr.S.Jessica Saritha,. (2020). Data Theft Protection In Cloud Storage Using Three Layer Architecture Using Decoy Documents. International Journal of Advanced Science and Technology, 29(08), 5497 - 5509. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/33028
Section
Articles