Abstract:
In the current era, data is said to be more expensive than any of the materialistic things in the world. Data is so fragile that it can easily be tampered with to either decrypt it or it can be made permanently inaccessible without any 1st personal intervention. The term Cloud Computing has gained widespread over the last couple of years. For approximately two decades Cloud computing has had a lead role in the field of IT and a bulk portion of the business community is depending on cloud storage. With the coming of big data and cloud services, client data has turned into a significant issue. Although a variety of detection and anticipation advancements are utilized to ensure client data, ransomware that requests money in return for one’s data has arisen. There have been many incidents in the past where data of many users including even high-end companies became compromised which was followed by a ransom note to pay for the cost of decryption of their data mostly through bitcoins. Ransomware has various effects on data characteristics e.g. change in entropy, signatures, extensions, encryption, etc. In our research, we have focused on two main attributes of a file that is entropy and file inaccessibility. These two attributes will be used in our detection algorithm which will actively monitor the data saved in a secure vault with a flexible time interval. Initially, the surveillance code was employed in the sandbag environment of a virtual machine. The same surveillance code was then deployed on Amazon Web Server EC2 virtual server to carry out surveillance of shared storage on the cloud for pre-emptive detection of ransomware. In the end, the resource intensity in terms of processing power and memory of surveillance code will be analyzed on a cloud server.