An overview of insider attacks in cloud computing

被引:15
|
作者
Duncan, Adrian [1 ]
Creese, Sadie [1 ]
Goldsmith, Michael [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Cybersecur Grp, Oxford OX1 3QD, England
来源
基金
英国工程与自然科学研究理事会;
关键词
internal attacks; insider attacks; cloud computing; insider threat; cloud computing security;
D O I
10.1002/cpe.3243
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing offers the potential for significant cost reductions and increased agility for users. However, security concerns continue to be raised as a potential barrier to uptake for private, community and public clouds. A report from the European Network and Information Security Agency on the Priorities for Research on Current and Emerging Network Technologies highlighted trusted cloud models as one of its top priorities for further research. More recentlySeptember 2012Carnegie Mellon University's computer emergency response team have released a paper describing insider threats to cloud computing as a direction for new research. Further, a project completed at the University of Warwick in 2010 investigated security aspects of cloud computing and in particular the potential for cascade effects. This research involved a detailed modelling of the threat and vulnerability landscape, including the incentives and motivations that might drive attackers. One of the conclusions is that insider threats potentially pose the most significant source of risk. This paper presents the progress made on furthering this research by investigating what attacks are available to insiders together with the damage and implications of such attacks. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2964 / 2981
页数:18
相关论文
共 50 条
  • [1] Cloud Computing: Insider Attacks on Virtual Machines During Migration
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    Quinton, Jamie S.
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 493 - 500
  • [2] Preventing Insider Attacks in the Cloud
    Sundararajan, Sudharsan
    Narayanan, Hari
    Pavithran, Vipin
    Vorungati, Kaladhar
    Achuthan, Krishnashree
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
  • [3] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    [J]. CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [4] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [5] Mitigating Insider Data Theft Attacks in the Cloud
    Kowsik, R.
    Vignesh, L.
    [J]. 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 561 - 567
  • [6] Cloud computing: An overview
    CTO Roundtable Series
    [J]. Queue, 2009, 5
  • [7] Cloud Computing: An Overview
    Qian, Ling
    Luo, Zhiguo
    Du, Yujian
    Guo, Leitao
    [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 626 - +
  • [8] A Multidimension Taxonomy of Insider Threats in Cloud Computing
    Alhanahnah, Mohannad J.
    Jhumka, Arshad
    Alouneh, Sahel
    [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622
  • [9] Cloud Computing: A paradigm of more Insider Threats
    Bin Ahmad, Maaz
    Asif, Muhammad
    Saad, Afshan
    Wahab, Abdul
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE 2019), 2019, : 107 - 112
  • [10] Ciphertext Retrieval against Insider Attacks for Cloud Storage
    Xie, Run
    Xui, Chunxiang
    Li, Fagen
    He, Changlian
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 202 - 206