2 research outputs found

    Implementation of Decoy Deception based Detection System for Ransomware Attack

    Get PDF
    Ransomware poses a dangerous threat to  cybersecurity. Data as well as rights owned by the user are  adversely impacted. The situation has become considerably  more critical as a result of the emergence of new ransomware  varieties and Ransomware-as-a-Service. In this paper, we  presented a novel deception-based and behaviour-based  method for real-time ransomware detection. In order to avoid  any loss before ransomware is discovered, we build pretend  files and directories for nefarious behaviours. We conducted a  pilot study using Locky, and the results demonstrate the  effectiveness of our strategy with little system resource usage  and geographical cost.&nbsp

    Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality

    Get PDF
    The paper proposes a role-based secure data access control framework for cost-optimized cloud storage, addressing the challenge of maintaining data security, privacy, integrity, and availability at lower cost. The proposed framework incorporates a secure authenticity scheme to protect data during storage or transfer over the cloud. The framework leverages storage cost optimization by compressing high-resolution images and fragmenting them into multiple encrypted chunks using the owner's private key. The proposed approach offers two layers of security, ensuring that only authorized users can decrypt and reconstruct data into its original format. The implementation results depicts that the proposed scheme outperforms existing systems in various aspects, making it a reliable solution for cloud service providers to enhance data security while reducing storage costs
    corecore