Preventing insider attacks in the cloud

N/ACitations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is becoming popular due to its ability to provide dynamic scalability and elasticity of resources at affordable cost. In spite of these advantages key concerns that prevent large scale adoption of cloud computing today are related to security and privacy of customer's data in the cloud. The main security concerns of clients are loss of direct control of their data and being forced to trust a third party provider with confidential information. Among security threats in the cloud, insider threats pose a serious risk to clients. This paper presents a new access control mechanism that can mitigate security threats in the cloud including those caused by insiders, such as malicious system administrators. The problem is challenging because the cloud provider's system administrators have elevated privileges for performing genuine system maintenance and administration tasks. We describe an access control mechanism that generates immutable security policies for a client, propagates and enforces them at the provider's infrastructure. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Sundararajan, S., Narayanan, H., Pavithran, V., Vorungati, K., & Achuthan, K. (2011). Preventing insider attacks in the cloud. In Communications in Computer and Information Science (Vol. 190 CCIS, pp. 488–500). https://doi.org/10.1007/978-3-642-22709-7_48

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free