Tackling Insider Threat in Cloud Relational Databases

被引:7
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [2 ]
机构
[1] Yarmouk Univ, Dept Comp Sci, Irbid, Jordan
[2] Univ Arkansas, Dept Comp Sci & Engn, Fayetteville, AR 72701 USA
关键词
cloud computing; databases; insider threat; security; SECURITY;
D O I
10.1109/UCC.2012.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud security is one of the major issues that worry individuals and organizations about cloud computing. Therefore, defending cloud systems against attacks such as insiders' attacks has become a key demand. This paper investigates insider threat in cloud relational database systems (cloud RDMS). It discusses some vulnerabilities in cloud computing structures that may enable insiders to launch attacks, and shows how load balancing across multiple availability zones may facilitate insider threat. To prevent such a threat, the paper suggests three models, which are Peer-to-Peer model, Centralized model and Mobile- Knowledgebases model, and addresses the conditions under which they work well.
引用
收藏
页码:215 / 218
页数:4
相关论文
共 50 条
  • [41] Intelligence Analyses and the Insider Threat
    Santos, Eugene, Jr.
    Hien Nguyen
    Yu, Fei
    Kim, Keum Joo
    Li, Deqing
    Wilkinson, John T.
    Olson, Adam
    Russell, Jacob
    Clark, Brittany
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347
  • [42] Combating the insider cyber threat
    Greitzer, Frank L.
    Moore, Andrew P.
    Cappelli, Dawn M.
    Andrews, Dee H.
    Carroll, Lynn A.
    Hull, Thomas D.
    IEEE SECURITY & PRIVACY, 2008, 6 (01) : 61 - 64
  • [43] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [44] Addressing the Insider Threat Introduction
    Pfleeger, Shari Lawrence
    Stolfo, Salvatore J.
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 10 - 13
  • [45] Inside the Insider Threat (Introduction)
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2728 - 2728
  • [46] Guarding Against the Insider Threat
    Archuleta, Edmund G.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2009, 101 (05): : 38 - +
  • [47] Honeypots: Catching the insider threat
    Spitzner, L
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 170 - 179
  • [48] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [49] Safeguarding against the insider threat
    Bulpett B.
    Network Security, 2020, 2020 (06): : 14 - 17
  • [50] Balancing the insider and outsider threat
    Walton, Richard
    Limited, Walton-Mackenzie
    Computer Fraud and Security, 2006, 2006 (11): : 8 - 11