Mitigating insider threat in cloud relational databases

被引:8
|
作者
Yaseen, Qussai [1 ]
Althebyan, Qutaibah [2 ]
Panda, Brajendra [4 ]
Jararweh, Yaser [3 ]
机构
[1] Jordan Univ Sci & Technol, Comp Informat Syst Dept, Irbid, Jordan
[2] Jordan Univ Sci & Technol, Software Engn Dept, Irbid, Jordan
[3] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
[4] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
cloud computing; databases; insider threat; security; SECURITY;
D O I
10.1002/sec.1405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud security has become one of the emergent issues because of the immense growth of cloud services. A major concern in cloud security is the insider threat because of the harm that it poses. Therefore, defending cloud systems against insider attacks has become a key demand. This work deals with insider threat in cloud relational database systems. It reveals the flaws in cloud computing that insiders may use to launch attacks and discusses how load balancing across availability zones may increase insider threat. To mitigate this kind of threat, the paper proposes four models, which are peer-to-peer model, centralized model, Mobile-Knowledgebases model, and Guided Mobile-Knowledgebases model, and it discusses their advantages as well as their limitations. Moreover, the paper provides experiments and analysis that compare among the proposed models, demonstrate their effectiveness, and show the conditions under which they work with highest performance. Copyright (c) 2016 John Wiley & Sons, Ltd
引用
收藏
页码:1132 / 1145
页数:14
相关论文
共 50 条
  • [21] Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection
    Carvallo, Pamela
    Cavalli, Ana R.
    Kushik, Natalia
    ICSOFT: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2017, : 480 - 487
  • [22] Insider threat prevention in distributed database as a service cloud environment
    Deep, Gaurav
    Sidhu, Jagpreet
    Mohana, Rajni
    COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 169
  • [23] Mitigating the insider threat of remote administrators in clouds through maintenance task assignments
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (04) : 427 - 458
  • [24] A Distribution Management System for Relational Databases in Cloud Environments
    Sze-Yao Li
    Chun-Ming Chang
    Yuan-Yu Tsai
    Seth Chen
    Jonathan Tsai
    Wen-Lung Tsai
    Journal of Electronic Science and Technology, 2013, (02) : 169 - 175
  • [25] Data Integration of Cloud-based and Relational Databases
    Malhotra, Shweta
    Doja, M. N.
    Alam, Bashir
    Alam, Mansaf
    2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND IMPLEMENTATIONS (ICSCTI), 2015,
  • [26] A Method of Protecting Relational Databases Copyright with Cloud Watermark
    Zhang, Yong
    Niu, Xiamu
    Zhao, Dongning
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 68 - 72
  • [27] A Distribution Management System for Relational Databases in Cloud Environments
    SzeYao Li
    ChunMing Chang
    YuanYu Tsai
    Seth Chen
    Jonathan Tsai
    WenLung Tsai
    Journal of Electronic Science and Technology, 2013, 11 (02) : 169 - 175
  • [28] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [29] Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry
    Mahalle, Abhishek
    Yong, Jianming
    Tao, Xiaohui
    PROCEEDINGS OF THE 2019 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2019, : 16 - 21
  • [30] Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective
    Callegati, Franco
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    COMPUTERS & SECURITY, 2018, 74 : 277 - 295