2014
DOI: 10.1002/cpe.3243
|View full text |Cite
|
Sign up to set email alerts
|

An overview of insider attacks in cloud computing

Abstract: Summary Cloud computing offers the potential for significant cost reductions and increased agility for users. However, security concerns continue to be raised as a potential barrier to uptake for private, community and public clouds. A report from the European Network and Information Security Agency on the Priorities for Research on Current and Emerging Network Technologies highlighted trusted cloud models as one of its top priorities for further research. More recently—September 2012—Carnegie Mellon Universit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 5 publications
(8 reference statements)
0
20
0
Order By: Relevance
“…Notwithstanding, the literature also reveals that obstacles and difficulties exist in organizations' adoption of cloud computing, such as reticence regarding information security and protection against nonauthorized access [14,15], the absence of knowledge on the privacy capabilities of service providers [16], a lack of understanding between the organization and the cloud provider as to service scope and 2 Mobile Information Systems implementation [17], technical barriers [18], and financing problems that companies in certain sectors might have to address the required investment in technology and qualified IT personnel, especially in the case of small and medium enterprises [11,19].…”
Section: Introductionmentioning
confidence: 99%
“…Notwithstanding, the literature also reveals that obstacles and difficulties exist in organizations' adoption of cloud computing, such as reticence regarding information security and protection against nonauthorized access [14,15], the absence of knowledge on the privacy capabilities of service providers [16], a lack of understanding between the organization and the cloud provider as to service scope and 2 Mobile Information Systems implementation [17], technical barriers [18], and financing problems that companies in certain sectors might have to address the required investment in technology and qualified IT personnel, especially in the case of small and medium enterprises [11,19].…”
Section: Introductionmentioning
confidence: 99%
“…If the responsibility of providing these services to the user is one task, the other important task is to ensure that these services are being provided while also ensuring the important features of privacy and security. As shown in [13,14], insider threats potentially pose the most significant source of risk and it is the major threat to cloud user's privacy and security.…”
Section: Related Workmentioning
confidence: 99%
“…An insider attack with the cloud is easier to perform as whole image is stored on cloud [15], [14] and has far greater impact than an attack in a traditionalinfrastructure [17]. A method that provides image compression along with image security uses a combination of EZW for authentication& chaos for security proposed in [19].…”
Section: Introductionmentioning
confidence: 99%