Preventing Insider Attacks in the Cloud

被引:0
|
作者
Sundararajan, Sudharsan [1 ]
Narayanan, Hari [1 ]
Pavithran, Vipin [1 ]
Vorungati, Kaladhar [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham Univ, Ctr Cyber Secur, Amritapuri 690525, Kollam, India
[2] NetApp, Sunnyvale, CA 94089 USA
关键词
Insider Threats; Cloud Computing; Security; Security Policy; Access Control; Hypervisor instrumentation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming popular due to its ability to provide dynamic scalability and elasticity of resources at affordable cost. In spite of these advantages key concerns that prevent large scale adoption of cloud computing today are related to security and privacy of customer's data in the cloud. The main security concerns of clients are loss of direct control of their data and being forced to trust a third party provider with confidential information. Among security threats in the cloud, insider threats pose a serious risk to clients. This paper presents a new access control mechanism that can mitigate security threats in the cloud including those caused by insiders, such as malicious system administrators. The problem is challenging because the cloud provider's system administrators have elevated privileges for performing genuine system maintenance and administration tasks. We describe an access control mechanism that generates immutable security policies for a client, propagates and enforces them at the provider's infrastructure.
引用
收藏
页码:488 / +
页数:3
相关论文
共 50 条
  • [1] An overview of insider attacks in cloud computing
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2964 - 2981
  • [2] Mitigating Insider Data Theft Attacks in the Cloud
    Kowsik, R.
    Vignesh, L.
    [J]. 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 561 - 567
  • [3] Privileged Account Management Approach for Preventing Insider Attacks
    Sindiren, Erhan
    Ciylan, Bunyamin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (01): : 33 - 42
  • [4] Ciphertext Retrieval against Insider Attacks for Cloud Storage
    Xie, Run
    Xui, Chunxiang
    Li, Fagen
    He, Changlian
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 202 - 206
  • [5] Preventing Pollution Attacks in Cloud Storages
    Viswas, Aswin V.
    Samuel, Philip
    [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 812 - 819
  • [6] An Approach for Preventing and Detecting Attacks in the Cloud
    Merino, Louis-Henri
    Cukier, Michel
    [J]. 2020 IEEE/ACM 13TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2020), 2020, : 165 - 175
  • [7] Cloud Computing: Insider Attacks on Virtual Machines During Migration
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    Quinton, Jamie S.
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 493 - 500
  • [8] Secure Cloud Maintenance Protecting workloads against insider attacks
    Bleikertz, Soren
    Kurmus, Anil
    Nagy, Zoltan A.
    Schunter, Matthias
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [9] Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
    Eberz, Simon
    Rasmussen, Kasper B.
    Lenders, Vincent
    Martinovic, Ivan
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [10] A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds
    Khan, Imran
    Anwar, Zahid
    Bordbar, Behzad
    Ritter, Eike
    Rehman, Habib-ur
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 942 - 954