Abstract: Cloud Computing is the fastest growing technology in the software market. We are using clouds from Google Drive to social networking everyday. It is result of evolution and adoption of existing technologies. With these new computing and communications paradigms arise new data security challenges. Various protection mechanism techniques like Encryption have failed in preventing attacks carried out by Cloud service provider employees i.e. insider attack. To solve such issues, we proposed a new approach for securing data in the cloud using Decoy files. We observe data access patterns for user of cloud, based on these observations, we are deciding to send original or decoys file to user. The basic idea is that we can limit the damage of stolen data if we decrease the value of that stolen information to the attacker. This protects against the misuse of the userís real data
Keywords: †Decoy files, Cryptographic keys, OTP, DSA.