This paper is about deploying Honeyd, a virtual honeypot that simulates different operating system on Eucalyptus Iaas cloud and usage of proposed encryption methodology on data to make data access secure. The data collected in capture mode is analyzed to prevent further exploitation of system. |