Abstract:
Cloud Computing is the fastest growing
technology in the software market. We are using clouds from Google Drive to
social networking everyday. It is result of evolution
and adoption of existing technologies. With these new computing and
communications paradigms arise new data security challenges. Various protection
mechanism techniques like Encryption have failed in preventing attacks carried
out by Cloud service provider employees i.e. insider attack. To solve such
issues, we proposed a new approach for securing data in the cloud using Decoy
files. We observe data access patterns for user of cloud, based on these
observations, we are deciding to send original or decoys file to user. The
basic idea is that we can limit the damage of stolen data if we decrease the
value of that stolen information to the attacker. This protects against the
misuse of the user’s real data
Keywords: Decoy files, Cryptographic keys, OTP, DSA.