JOURNAL ARTICLE

Insider Threat Mitigation in Cloud Computing

Kunal KumarMandalDebayan Chatterjee

Year: 2015 Journal:   International Journal of Computer Applications Vol: 120 (20)Pages: 7-11

Abstract

Insider threat is one of the most critical security threats for any Industry, even it is the most eldest strategy to fall an empire down, very common in diplomacy according to the human history. In the cloud computing ecosystem there are several problems that is harder than the normal (not could) scenarios. If the insider threats are the most dangerous threat even in the non-cloud platform then it must has multi-dimensional attack vectors in cloud computing. Many researches have been done and are being carried out in the field of cyber security for malicious insider attacks. In the provider end of the service, the insider who can harm the system most is the System administrator because he has the highest access control and other privileges. Sometimes when the user demands some resources and the provider is running out of that kind of resource then, they outsource the resource from the third party or cloud broker. The resources are like server, storage and device or public/private cloud. In this paper we propose a technical solution and some policies for the cloud provider to mitigate the insider attack due to the rogue administrator. We also discuss about the possibility of insider attack in outsourcing issue of cloud computing and provide some policies as solution for that problem.

Keywords:
Computer science Insider Cloud computing Insider threat Computer security Data science Operating system Law

Metrics

5
Cited By
0.79
FWCI (Field Weighted Citation Impact)
20
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

The Insider Threat in Cloud Computing

Miltiadis KandiasNikos VirvilisDimitris Gritzalis

Lecture notes in computer science Year: 2013 Pages: 93-103
BOOK-CHAPTER

Insider Threat Detection and Cloud Computing

Arjun ChoudharyRajesh Bhadada

Lecture notes in networks and systems Year: 2022 Pages: 81-90
BOOK-CHAPTER

The insider threat problem from a cloud computing perspective

Keshnee Padayachee

Institution of Engineering and Technology eBooks Year: 2019 Pages: 241-272
JOURNAL ARTICLE

Insider Threat Detection and Mitigation

Anvesh GunugantiUSA

Journal:   Journal of Mathematical & Computer Applications Year: 2024 Pages: 1-6
© 2026 ScienceGate Book Chapters — All rights reserved.