Tackling Insider Threat in Cloud Relational Databases

被引:7
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [2 ]
机构
[1] Yarmouk Univ, Dept Comp Sci, Irbid, Jordan
[2] Univ Arkansas, Dept Comp Sci & Engn, Fayetteville, AR 72701 USA
关键词
cloud computing; databases; insider threat; security; SECURITY;
D O I
10.1109/UCC.2012.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud security is one of the major issues that worry individuals and organizations about cloud computing. Therefore, defending cloud systems against attacks such as insiders' attacks has become a key demand. This paper investigates insider threat in cloud relational database systems (cloud RDMS). It discusses some vulnerabilities in cloud computing structures that may enable insiders to launch attacks, and shows how load balancing across multiple availability zones may facilitate insider threat. To prevent such a threat, the paper suggests three models, which are Peer-to-Peer model, Centralized model and Mobile- Knowledgebases model, and addresses the conditions under which they work well.
引用
收藏
页码:215 / 218
页数:4
相关论文
共 50 条
  • [21] Data Integration of Cloud-based and Relational Databases
    Malhotra, Shweta
    Doja, M. N.
    Alam, Bashir
    Alam, Mansaf
    2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND IMPLEMENTATIONS (ICSCTI), 2015,
  • [22] A Method of Protecting Relational Databases Copyright with Cloud Watermark
    Zhang, Yong
    Niu, Xiamu
    Zhao, Dongning
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 68 - 72
  • [23] A Distribution Management System for Relational Databases in Cloud Environments
    SzeYao Li
    ChunMing Chang
    YuanYu Tsai
    Seth Chen
    Jonathan Tsai
    WenLung Tsai
    Journal of Electronic Science and Technology, 2013, 11 (02) : 169 - 175
  • [24] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [25] Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry
    Mahalle, Abhishek
    Yong, Jianming
    Tao, Xiaohui
    PROCEEDINGS OF THE 2019 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2019, : 16 - 21
  • [26] Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective
    Callegati, Franco
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    COMPUTERS & SECURITY, 2018, 74 : 277 - 295
  • [27] The insider threat ‘zoo’
    Renaud K.
    Warkentin M.
    Computer Fraud and Security, 2024, 2024 (05):
  • [29] Addressing the insider threat
    Application Security Inc
    Netw. Secur., 2008, 3 (11-14):
  • [30] Reflections on the insider threat
    Pfleeger, Charles P.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15