Insider attacks in cloud computing

92Citations
Citations of this article
121Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The computer-security industry is familiar with the concept of a Malicious Insider. However, a malicious insider in the cloud might have access to an unprecedented amount of information and on a much greater scale. Given the level of threat posed by insiders, and the rapid growth of the cloud computing ecosystem, we examine here the concept of insider attacks in cloud computing. Specifically, if more of our assets are going to reside in the cloud, and as increasingly our lives, enterprises and prosperity may depend upon cloud, it is imperative that we understand the scope for insider attacks so that we might best prepare defenses. We need to understand whether cloud might expose our assets to increased threat in terms of both actors and attack surface. We present here an assessment of current insider threat definitions and classifications, and their applicability to the cloud. We elucidate the nature of insiders with reference to the cloud ecosystem and close with examples of insider attacks which are specific to cloud environments (and hence hard to detect using current techniques). © 2012 IEEE.

References Powered by Scopus

SubVirt: Implementing malware with virtual machines

295Citations
N/AReaders
Get full text

A framework for understanding and predicting insider attacks

258Citations
N/AReaders
Get full text

The role of behavioral research and profiling in malicious cyber insider investigations

51Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks

485Citations
N/AReaders
Get full text

Cloud security issues and challenges: A survey

384Citations
N/AReaders
Get full text

Security issues in cloud environments: A survey

381Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Duncan, A. J., Creese, S., & Goldsmith, M. (2012). Insider attacks in cloud computing. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (pp. 857–862). https://doi.org/10.1109/TrustCom.2012.188

Readers over time

‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘22‘23‘24‘2506121824

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 69

83%

Researcher 8

10%

Professor / Associate Prof. 3

4%

Lecturer / Post doc 3

4%

Readers' Discipline

Tooltip

Computer Science 71

80%

Business, Management and Accounting 7

8%

Psychology 6

7%

Engineering 5

6%

Article Metrics

Tooltip
Mentions
References: 1

Save time finding and organizing research with Mendeley

Sign up for free
0