Mitigating insider threat in cloud relational databases

被引:8
|
作者
Yaseen, Qussai [1 ]
Althebyan, Qutaibah [2 ]
Panda, Brajendra [4 ]
Jararweh, Yaser [3 ]
机构
[1] Jordan Univ Sci & Technol, Comp Informat Syst Dept, Irbid, Jordan
[2] Jordan Univ Sci & Technol, Software Engn Dept, Irbid, Jordan
[3] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
[4] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
cloud computing; databases; insider threat; security; SECURITY;
D O I
10.1002/sec.1405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud security has become one of the emergent issues because of the immense growth of cloud services. A major concern in cloud security is the insider threat because of the harm that it poses. Therefore, defending cloud systems against insider attacks has become a key demand. This work deals with insider threat in cloud relational database systems. It reveals the flaws in cloud computing that insiders may use to launch attacks and discusses how load balancing across availability zones may increase insider threat. To mitigate this kind of threat, the paper proposes four models, which are peer-to-peer model, centralized model, Mobile-Knowledgebases model, and Guided Mobile-Knowledgebases model, and it discusses their advantages as well as their limitations. Moreover, the paper provides experiments and analysis that compare among the proposed models, demonstrate their effectiveness, and show the conditions under which they work with highest performance. Copyright (c) 2016 John Wiley & Sons, Ltd
引用
收藏
页码:1132 / 1145
页数:14
相关论文
共 50 条
  • [1] Tackling Insider Threat in Cloud Relational Databases
    Yaseen, Qussai
    Panda, Brajendra
    2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012), 2012, : 215 - 218
  • [2] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    Cluster Computing, 2017, 20 : 2669 - 2685
  • [3] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [4] Mitigating Malicious Updates: Prevention of Insider Threat to Databases
    Ragavan, Harini
    Panda, Brajendra
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 781 - 788
  • [5] A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
    Yaseen, Qussai
    Alabdulrazzaq, Aman
    Albalas, Firas
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 721 - 727
  • [6] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [7] An Access Abstraction Model for Mitigating the Insider Threat
    Jenkins, Jonathan
    ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
  • [8] Detection of Temporal Insider Threats to Relational Databases
    Sallam, Asmaa
    Bertino, Elisa
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 406 - 415
  • [9] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [10] Relational Databases, Virtualization, and the Cloud
    Ahrens, Maximilian
    Alonso, Gustavo
    IEEE 27TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2011), 2011, : 1254 - 1254