2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2015
DOI: 10.1109/iccicct.2015.7475303
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of data leakage and prevention techniques in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…The findings from our review do not overlap with the findings from the existing reviews. Unlike [2], [3], [4], and [5], which report the challenges faced by data leakage prevention systems, our review does not report any challenges, rather, it reports the data exfiltration attack vectors. Similar to [2] and [3], our review also presents a classification of the countermeasures, however, our criteria and the resulting classification are quite different to the classifications presented in [2] and [3].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The findings from our review do not overlap with the findings from the existing reviews. Unlike [2], [3], [4], and [5], which report the challenges faced by data leakage prevention systems, our review does not report any challenges, rather, it reports the data exfiltration attack vectors. Similar to [2] and [3], our review also presents a classification of the countermeasures, however, our criteria and the resulting classification are quite different to the classifications presented in [2] and [3].…”
Section: Resultsmentioning
confidence: 99%
“…Raman et al focus on challenges in data exfiltration and describe only three countermeasures from the academic literature. A review by Brindha and Shaji [5] highlights the issue of data exfiltration in the cloud environment with particular focus on data exfiltration caused by authorized entities. The authors highlight the leakage threats, causes of threats, types of information leaked, and data leakage channels.…”
Section: Existing Literature Reviewsmentioning
confidence: 99%
See 1 more Smart Citation
“…They also proposed social network analysis and test clustering as the main approaches for efficiently detecting data exfiltration. In [52], the authors highlighted the channels used for exfiltrating data from cloud environments, the vulnerabilities leading to data exfiltration, and the types of data most vulnerable to exfiltration attacks. The authors of [53] reported different states of data, challenges (e.g., encryption and access control) in detecting data exfiltration, detection approaches (e.g., secure keys), and limitations/future research areas in data exfiltration.…”
Section: B Existing Literature Reviewsmentioning
confidence: 99%
“…Up to our best knowledge, only little work was considering the users' concerns other than data security, integrity, and availability. Recent surveys on cloud computing security and auditing [25]- [28] didn't cover the concerns we talk about here, namely; spatial, temporal, and legal concerns. Although a little work was dedicated to enforce compliance of CSPs with data location regulations using auditing, the demonstration of the compliance of cloud providers to their contractual obligations is not yet convincing and more research is needed [29].…”
Section: Introductionmentioning
confidence: 99%