2012 IEEE 36th Annual Computer Software and Applications Conference 2012
DOI: 10.1109/compsac.2012.113
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threats to Cloud Computing: Directions for New Research Challenges

Abstract: Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. The common notion of a cloud insider as a rogue administrator of a service provider is discussed, but we also present two additional cloudrelated insider risks: the insider who exp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 106 publications
(39 citation statements)
references
References 12 publications
0
39
0
Order By: Relevance
“…We screened 177 abstracts, evaluated 50 full-text articles, and included 37 articles-a total of 22 studies (59 %) propose novel IDPAs [9,. The other 15 papers either propose new features for IDP or discusses challenges associated with IDP [33][34][35][36][37][38][39][40][41][42][43][44][45][46][47]. Figure 1 presents the flow chart of the study selection process.…”
Section: Study Selectionmentioning
confidence: 99%
“…We screened 177 abstracts, evaluated 50 full-text articles, and included 37 articles-a total of 22 studies (59 %) propose novel IDPAs [9,. The other 15 papers either propose new features for IDP or discusses challenges associated with IDP [33][34][35][36][37][38][39][40][41][42][43][44][45][46][47]. Figure 1 presents the flow chart of the study selection process.…”
Section: Study Selectionmentioning
confidence: 99%
“…Identified cloud security aspects include governance and compliance, virtualization, identity management [21][22] [23], and various threats aspects [24] [25]. Cloud Security Alliance (CSA) published the security report namely The Treacherous Twelve Cloud Computing Top Threats in 2016 providing organizations with the awareness of cloud security issues in making educated risk-management decisions [26].…”
Section: 2mentioning
confidence: 99%
“…These changes can affect how insider attacks [26] and intrusions are performed. For example, the physical machine on which a VM is hosted can affect potential attacks scenarios.…”
Section: Adaptive Evidence Collection Scenariosmentioning
confidence: 99%