An overview of insider attacks in cloud computing

被引:15
|
作者
Duncan, Adrian [1 ]
Creese, Sadie [1 ]
Goldsmith, Michael [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Cybersecur Grp, Oxford OX1 3QD, England
来源
基金
英国工程与自然科学研究理事会;
关键词
internal attacks; insider attacks; cloud computing; insider threat; cloud computing security;
D O I
10.1002/cpe.3243
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing offers the potential for significant cost reductions and increased agility for users. However, security concerns continue to be raised as a potential barrier to uptake for private, community and public clouds. A report from the European Network and Information Security Agency on the Priorities for Research on Current and Emerging Network Technologies highlighted trusted cloud models as one of its top priorities for further research. More recentlySeptember 2012Carnegie Mellon University's computer emergency response team have released a paper describing insider threats to cloud computing as a direction for new research. Further, a project completed at the University of Warwick in 2010 investigated security aspects of cloud computing and in particular the potential for cascade effects. This research involved a detailed modelling of the threat and vulnerability landscape, including the incentives and motivations that might drive attackers. One of the conclusions is that insider threats potentially pose the most significant source of risk. This paper presents the progress made on furthering this research by investigating what attacks are available to insiders together with the damage and implications of such attacks. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2964 / 2981
页数:18
相关论文
共 50 条
  • [41] AN OVERVIEW OF CLOUD COMPUTING IN DISTRIBUTED SYSTEMS
    Divakarla, Usha
    Kumari, Geetha
    [J]. INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 184 - 186
  • [42] Forensic Model for Cloud Computing: An Overview
    Alex, M. Edington
    Kishore, R.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1291 - 1295
  • [43] Pricing Schemes in Cloud Computing: An Overview
    Mazrekaj, Artan
    Shabani, Isak
    Sejdiu, Besmir
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 80 - 86
  • [44] An Overview of Data Storage in Cloud Computing
    Odun-Ayo, Isaac
    Ajayi, Olasupo
    Akanle, Boladele
    Ahuja, Ravin
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 29 - 34
  • [45] Shield Applications Opposite to DDOS Attacks in Cloud Computing
    Madhan, G.
    Tirupathamma, K. Rasi
    Saitha, K.
    Reddy, K. Anji
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 2437 - 2445
  • [46] Effective Way to Defend the Hypervisor Attacks in Cloud Computing
    Dildar, Muhammad Shahid
    Khan, Nayeem
    Bin Abdullah, Johari
    Khan, Adnan Shahid
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 154 - 159
  • [47] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [48] ANALYSIS OF VARIOUS VIRTUAL MACHINE ATTACKS IN CLOUD COMPUTING
    Annapoorani, S.
    Srinivasan, B.
    Mylavathi, G. A.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1016 - 1019
  • [49] Study on DDoS Attacks based on DPDK in Cloud Computing
    Zhao, Xutao
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [50] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146