2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.188
|View full text |Cite
|
Sign up to set email alerts
|

Insider Attacks in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
49
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 92 publications
(50 citation statements)
references
References 4 publications
1
49
0
Order By: Relevance
“…Both of these issues arise due to failed data security measures. Data confidentiality refers to protecting the customers' data from being disclosed to illegitimate [12,16,24,25,26] Insider attacks [16,27,28,29] parties without their express approval while data integrity refers to protecting consumers' data from malicious modifications and ensuring the accuracy and consistency of data [2]. Table 2 presents the main challenges that need to be considered during the adoption and use of Cloud computing.…”
Section: Securitymentioning
confidence: 99%
“…Both of these issues arise due to failed data security measures. Data confidentiality refers to protecting the customers' data from being disclosed to illegitimate [12,16,24,25,26] Insider attacks [16,27,28,29] parties without their express approval while data integrity refers to protecting consumers' data from malicious modifications and ensuring the accuracy and consistency of data [2]. Table 2 presents the main challenges that need to be considered during the adoption and use of Cloud computing.…”
Section: Securitymentioning
confidence: 99%
“…al., in [15] discussed malicious insider which is known by every computer security industry. Whenever company's hire security-related employees like system administrator or IT security specialist, they seek reference check, family background and take interview so many times until satisfied.…”
Section: Literature Reviewmentioning
confidence: 99%
“…al., in [12] discussed the insider attacks. The Insider is anyone who has the authorized access to the organization's network or information system.…”
Section: Literature Reviewmentioning
confidence: 99%