Preventing Insider Attacks in the Cloud

被引:0
|
作者
Sundararajan, Sudharsan [1 ]
Narayanan, Hari [1 ]
Pavithran, Vipin [1 ]
Vorungati, Kaladhar [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham Univ, Ctr Cyber Secur, Amritapuri 690525, Kollam, India
[2] NetApp, Sunnyvale, CA 94089 USA
关键词
Insider Threats; Cloud Computing; Security; Security Policy; Access Control; Hypervisor instrumentation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming popular due to its ability to provide dynamic scalability and elasticity of resources at affordable cost. In spite of these advantages key concerns that prevent large scale adoption of cloud computing today are related to security and privacy of customer's data in the cloud. The main security concerns of clients are loss of direct control of their data and being forced to trust a third party provider with confidential information. Among security threats in the cloud, insider threats pose a serious risk to clients. This paper presents a new access control mechanism that can mitigate security threats in the cloud including those caused by insiders, such as malicious system administrators. The problem is challenging because the cloud provider's system administrators have elevated privileges for performing genuine system maintenance and administration tasks. We describe an access control mechanism that generates immutable security policies for a client, propagates and enforces them at the provider's infrastructure.
引用
收藏
页码:488 / +
页数:3
相关论文
共 50 条
  • [21] Insider attacks: human-factors attacks and mitigation
    Abulencia, Jesse
    [J]. Computer Fraud and Security, 2021, 2021 (05): : 14 - 17
  • [22] ADRCN: A Framework to Detect and Mitigate Malicious Insider Attacks in Cloud-Based Environment on IaaS
    Oberoi, Priya
    Mittal, Sumit
    Gujral, Rajneesh Kumar
    [J]. INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2019, 4 (03) : 654 - 670
  • [23] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [24] 'Green on Blue': Insider Attacks in Afghanistan
    Long, Austin
    [J]. SURVIVAL, 2013, 55 (03) : 167 - 182
  • [25] The SEC Attacks "Shadow Insider Trading"
    Barron, Robert A.
    [J]. SECURITIES REGULATION LAW JOURNAL, 2022, 50 (01):
  • [26] Characterizing Social Insider Attacks on Facebook
    Ahmed Usmani, Wali
    Marques, Diogo
    Beschastnikh, Ivan
    Beznosov, Konstantin
    Guerreiro, Tiago
    Carrico, Luis
    [J]. PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 3810 - 3820
  • [27] An Analysis of Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (01)
  • [28] Techniques and countermeasures for preventing insider threats
    Alsowail, Rakan A.
    Al-Shehari, Taher
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [29] A New Approach for Detection of Insider Attacks
    Sen, Sevil
    [J]. 2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [30] Detecting Insider Attacks in Blockchain Networks
    Ajayi, Oluwaseyi
    Saadawi, Tarek
    [J]. 2021 International Symposium on Networks, Computers and Communications, ISNCC 2021, 2021,