INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.in Vol.2 Issue.2, Pg.: 51-55 February 2014 G.Dileep Kumar et al Page 51 INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INSIDER DATA THEFT DETECTION USING DECOY AND USER BEHAVIOR PROFILE G. Dileep Kumar 1 and Kolla Morarjee 2 1 Department of Computer Science and Engineering, CMR Institute of Technology, Medchal, 501401, Hyderabad, Andhra Pradesh, India dileepkumar.gattu569@gmail.com 2 Assistant Professor, Department of Computer Science and Engineering, CMR Institute of Technology, Medchal, 501401, Hyderabad, Andhra Pradesh, India morarjeek@gmail.com Abstract Cloud Computing enables multiple users to, share common resources, and to store their personal and business information and access them. The major of the cloud users are from the internet. The users those who have valid authority on the cloud are called insiders. In all the remote users are to be treated as attackers in the security perspective. If the remote user is not an attacker then that should be checked by the security systems. If a valid user‟s access details are stolen by an attacker, then attacker can enter and access the cloud as a valid user. Distinguishing the valid user and the attacker, the protection of the real user‟s sensitive data on the cloud from the attacker and securing the fog cloud with decoy information technology are the major challenges in the field of cloud computing. The Decoy Information Technology is used for validating whether data access is authorized; in the eventuality of any abnormal information access detection it confuses the attacker with bogus information. Keywords: Fog computing, decoy information, decoy technology, data access, and malicious insider. 1. Introduction Cloud computing is the delivery of computing services over the Internet. The cloud computing has agility, scalability, elasticity and multi-tenancy. Since the sixties, cloud computing has developed. Since the internet only started to offer meaningful bandwidth in the nineties. Now a days, Cloud computing is the delivery of computing services on the Internet. The Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. The cloud services include social networking sites, online file storage, online business applications and webmail. The cloud computing model allows access to information and computer resources from anywhere that a network connection is available. The cloud computing provides an shared pool of resources, including networks, data storage space, computer processing power, user applications and specialized corporate. The characteristics of cloud computing include on-demand broad network access, self-service, measured service, resource pooling and rapid elasticity. Self-service means that customers can manage and request their own resources. In the Internet or private networks the services to be offered are known as Broad network access. Pooled