Insider Threat Mitigation in Cloud Computing

نویسندگان

  • Rajashree Sahoo
  • Manoranjan Pradhan
چکیده

Insider threat is one in all the foremost crucial security threats for any trade, even it's the foremost eldest strategy to fall associate degree empire down, quite common in diplomacy per the human history. Within the cloud computing scheme there are many issues that's tougher than the conventional (not could) eventualities. If the corporate executive threats are the foremost dangerous threat even within the non-cloud platform then it should has multi-dimensional attack vectors in cloud computing Cloud Computing, that once provided domestically, has seen a technical and cultural shift of computing service provision to being provided remotely, and as a group, by third-party service suppliers. The info has currently been placed underneath the protection of the service supplier that was once placed underneath the protection domain of the service user. Cloud computing is associate degree raising technology paradigm, sanctioning and facilitating the dynamic and versatile provision of process resources and Services. Albeit the benefits offered by cloud computing are many there still exist second thoughts on the protection and privacy of the cloud services. Use of cloud services affects the protection posture of organizations and demanding infrastructures, thus it's necessary that new threats and risks introduced by this new paradigm are clearly understood and mitigated. During this paper we have a tendency to concentrate on the corporate executive threat in cloud computing. The target of this paper is to indicate that however a malicious corporate executive will steal confidential knowledge of the cloud user.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insider Threat Mitigation in Cloud Computing

Insider threat is one of the most critical security threats for any Industry, even it is the most eldest strategy to fall an empire down, very common in diplomacy according to the human history. In the cloud computing ecosystem there are several problems that is harder than the normal (not could) scenarios. If the insider threats are the most dangerous threat even in the non-cloud platform then...

متن کامل

Mitigating insider threat in cloud relational databases

Cloud security has become one of the emergent issues because of the immense growth of cloud services. A major concern in cloud security is the insider threat because of the harm that it poses. Therefore, defending cloud systems against insider attacks has become a key demand. This work deals with insider threat in cloud relational database systems. It reveals the flaws in cloud computing that i...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

The Insider Threat in Cloud Computing

Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic and versatile provision of computational resources and services. Even though the advantages offered by cloud computing are several, there still exist second thoughts on the security and privacy of the cloud services. Use of cloud services affects the security posture of organizations and critical infrastru...

متن کامل

Towards an insider threat prediction specification language

Purpose This concept paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats originating from legitimate users in an IT infrastructure. Various information security surveys indicate that misuse by legitimate (insider) users has serious implications for the health of IT environments. A brief discussion of surve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016