International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 9 | Views: 99 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Review Papers | Computer Science and Information Technology | India | Volume 13 Issue 4, April 2024 | Rating: 5.9 / 10


An Appraisal of a Keylogging and Cryptography-Based Real-Time Keystroke Monitoring System for Enhancing Cloud Security

Rohit Mourya | Kunika Patil | Srivaramangai R [3]


Abstract: An insider attack is a security threat that occurs when someone with authorized access to an organization's systems or data maliciously misuses that access for malicious purposes. This type of attack is particularly dangerous because the insider often has knowledge of the organization?s systems, processes, and sensitive information, making it easier for them to avoid detection and carry out their nefarious activities. To mitigate the risks associated with insider attacks, organizations should implement security measures such as access controls, monitoring and logging of user activities, employee training on security best practices, and regular security audits to detect any suspicious behavior. It is essential for organizations to have a comprehensive insider threat management program in place to prevent, detect, and respond to insider attacks effectively. This work explores the concept of keylogging as a potentially beneficial tool for enhancing cybersecurity measures, particularly in the context of safeguarding data stored in cloud computing environments. Keylogging, traditionally associated with malicious activities like identity theft and financial fraud, is harnessed in this research to counter insider threats to cloud data security. By developing a system that employs keylogging techniques alongside cryptography, real-time alerts can be generated to notify authorized individuals of suspicious activities, enabling immediate actions to be taken to protect sensitive cloud information. The project aims to shift the narrative around keylogging from a tool of intrusion to a tool of defense, highlighting its potential to be utilized as a safety measure in cybersecurity practices. By leveraging keylogging and cryptography in a proactive manner, organizations can better mitigate internal threats and enhance the overall security of their cloud infrastructure.


Keywords: Keylogger, Cryptography, Insider malicious, Keystroke logging, Public Key Infrastructure


Edition: Volume 13 Issue 4, April 2024,


Pages: 65 - 72


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top