Return to Article Details Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop Download Download PDF