Preventing Insider Attacks in the Cloud

被引:0
|
作者
Sundararajan, Sudharsan [1 ]
Narayanan, Hari [1 ]
Pavithran, Vipin [1 ]
Vorungati, Kaladhar [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham Univ, Ctr Cyber Secur, Amritapuri 690525, Kollam, India
[2] NetApp, Sunnyvale, CA 94089 USA
关键词
Insider Threats; Cloud Computing; Security; Security Policy; Access Control; Hypervisor instrumentation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming popular due to its ability to provide dynamic scalability and elasticity of resources at affordable cost. In spite of these advantages key concerns that prevent large scale adoption of cloud computing today are related to security and privacy of customer's data in the cloud. The main security concerns of clients are loss of direct control of their data and being forced to trust a third party provider with confidential information. Among security threats in the cloud, insider threats pose a serious risk to clients. This paper presents a new access control mechanism that can mitigate security threats in the cloud including those caused by insiders, such as malicious system administrators. The problem is challenging because the cloud provider's system administrators have elevated privileges for performing genuine system maintenance and administration tasks. We describe an access control mechanism that generates immutable security policies for a client, propagates and enforces them at the provider's infrastructure.
引用
收藏
页码:488 / +
页数:3
相关论文
共 50 条
  • [31] Detecting Insider Attacks in Blockchain Networks
    Ajayi, Oluwaseyi
    Saadawi, Tarek
    [J]. 2021 International Symposium on Networks, Computers and Communications, ISNCC 2021, 2021,
  • [32] A framework for understanding and predicting insider attacks
    Schultz, EE
    [J]. COMPUTERS & SECURITY, 2002, 21 (06) : 526 - 531
  • [33] FBI data open to 'insider attacks'
    不详
    [J]. NEW SCIENTIST, 2007, 194 (2606) : 29 - 29
  • [34] Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud
    Babu, B. Mahesh
    Bhanu, Mary Saira
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 157 - 166
  • [35] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    [J]. CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [36] Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study
    Eddermoug, Nahid
    Mansour, Abdeljebar
    Sadik, Mohamed
    Sabir, Essaid
    Azmi, Mohamed
    [J]. 2021 28TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2021, : 57 - 62
  • [37] PREVENTING CORONARY ATTACKS
    SIMPSON, T
    FARROW, LJ
    [J]. BRITISH MEDICAL JOURNAL, 1964, 2 (541): : 1198 - &
  • [38] PREVENTING CORONARY ATTACKS
    SHARLAND, D
    LAZARUS, S
    [J]. BRITISH MEDICAL JOURNAL, 1964, 2 (542): : 1463 - +
  • [39] A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks
    Moon, Cheolmin Sky
    Chung, Sam
    Endicott-Popovsky, Barbara
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 260 - 271
  • [40] A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
    Dai, Hua
    Yang, Geng
    Zhu, Xiangyang
    Yi, Xun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 111 - 116