Tackling Insider Threat in Cloud Relational Databases

被引:7
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [2 ]
机构
[1] Yarmouk Univ, Dept Comp Sci, Irbid, Jordan
[2] Univ Arkansas, Dept Comp Sci & Engn, Fayetteville, AR 72701 USA
关键词
cloud computing; databases; insider threat; security; SECURITY;
D O I
10.1109/UCC.2012.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud security is one of the major issues that worry individuals and organizations about cloud computing. Therefore, defending cloud systems against attacks such as insiders' attacks has become a key demand. This paper investigates insider threat in cloud relational database systems (cloud RDMS). It discusses some vulnerabilities in cloud computing structures that may enable insiders to launch attacks, and shows how load balancing across multiple availability zones may facilitate insider threat. To prevent such a threat, the paper suggests three models, which are Peer-to-Peer model, Centralized model and Mobile- Knowledgebases model, and addresses the conditions under which they work well.
引用
收藏
页码:215 / 218
页数:4
相关论文
共 50 条
  • [1] Mitigating insider threat in cloud relational databases
    Yaseen, Qussai
    Althebyan, Qutaibah
    Panda, Brajendra
    Jararweh, Yaser
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1132 - 1145
  • [2] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    Cluster Computing, 2017, 20 : 2669 - 2685
  • [3] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [4] A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
    Yaseen, Qussai
    Alabdulrazzaq, Aman
    Albalas, Firas
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 721 - 727
  • [5] Malicious Users' Transactions: Tackling Insider Threat
    Li, Weihan
    Panda, Brajendra
    Yaseen, Qussai
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 211 - 222
  • [6] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [7] Tackling Complex Queries to Relational Databases
    Popescu, Octavian
    Ngoc Phuoc An Vo
    Sheinin, Vadim
    Khorashani, Elahe
    Yeo, Hangu
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2019, PT I, 2019, 11431 : 688 - 701
  • [8] Detection of Temporal Insider Threats to Relational Databases
    Sallam, Asmaa
    Bertino, Elisa
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 406 - 415
  • [9] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [10] Relational Databases, Virtualization, and the Cloud
    Ahrens, Maximilian
    Alonso, Gustavo
    IEEE 27TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2011), 2011, : 1254 - 1254