Home

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

Salvatore Stolfo; Malek Ben Salem; Angelos D. Keromytis

Title:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Author(s):
Stolfo, Salvatore
Ben Salem, Malek
Keromytis, Angelos D.
Date:
Type:
Articles
Department:
Computer Science
Permanent URL:
Book/Journal Title:
Proceedings: IEEE CS Security and Privacy Workshops: SPW 2012: 24-25 May 2012, San Francisco, California, USA
Publisher:
IEEE
Abstract:
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Subject(s):
Computer science
Publisher DOI:
http://dx.doi.org/10.1109/SPW.2012.19
Item views:
1757
Metadata:
text | xml

In Partnership with the Center for Digital Research and Scholarship at Columbia University Libraries/Information Services | Terms of Use