Insider Threats to Cloud Computing: Directions for New Research Challenges

被引:58
|
作者
Claycomb, William R. [1 ]
Nicoll, Alex [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, CERT Program, Pittsburgh, PA 15213 USA
关键词
insider; cloud; security;
D O I
10.1109/COMPSAC.2012.113
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. The common notion of a cloud insider as a rogue administrator of a service provider is discussed, but we also present two additional cloud-related insider risks: the insider who exploits a cloud-related vulnerability to steal information from a cloud system, and the insider who uses cloud systems to carry out an attack on an employer's local resources. We also characterize a hierarchy of administrators within cloud service providers, give examples of attacks from real insider threat cases, and show how the nature of cloud systems architectures enables attacks to succeed. Finally, we discuss our position on future cloud research.
引用
收藏
页码:387 / 394
页数:8
相关论文
共 50 条
  • [21] Cloud Computing - A Classification, Business Models, and Research Directions
    Weinhardt, Christof
    Anandasivam, Arun
    Blau, Benjamin
    Borissov, Nikolay
    Meinl, Thomas
    Michalk, Wibke
    Stoesser, Jochen
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2009, 1 (05): : 391 - +
  • [22] Cloud Computing – A Classification, Business Models, and Research Directions
    Christof Weinhardt
    Arun Anandasivam
    Benjamin Blau
    Nikolay Borissov
    Thomas Meinl
    Wibke Michalk
    Jochen Stößer
    [J]. Business & Information Systems Engineering, 2009, 1 : 391 - 399
  • [23] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [24] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [25] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [26] An overview of insider attacks in cloud computing
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2964 - 2981
  • [27] Multicores in Cloud Computing: Research Challenges for Applications
    Wang, Lizhe
    Tao, Jie
    von Laszewski, Gregor
    Marten, Holger
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (06) : 958 - 964
  • [28] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [29] New Directions of Nanoelectronics Research for Computing
    Chen, An
    [J]. 2018 14TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2018, : 181 - 184
  • [30] CLOUD OF THINGS: ARCHITECTURE, RESEARCH CHALLENGES, SECURITY THREATS, MECHANISMS AND OPEN CHALLENGES
    Haq, Shamsul
    Bashir, Adil
    Sholla, Sahil
    [J]. JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2020, 6 (04): : 415 - 433