{"title":"Trustworthy Framework for Insider Attack Prevention and Detection","authors":"","doi":"10.4018/978-1-5225-7924-3.ch005","DOIUrl":null,"url":null,"abstract":"This chapter introduces a trustworthy cloud computing architecture that uses the security properties offered by a virtual machine monitor that enforces the principle of least privilege. These security properties are a strong building block to provide trustworthy cloud computing services to cloud consumers. This chapter briefly explained about a proposed system to prevent insider attacks in cloud environment from cloud consumer and cloud service provider perspectives. The proposed framework is initiating how virtual machines are providing the most reliable security materials of the cloud computing architecture. For cloud consumers, the proposed architecture allocates the well-built security materials of the reliable cloud computing services.","PeriodicalId":287112,"journal":{"name":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","volume":"170 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-7924-3.ch005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This chapter introduces a trustworthy cloud computing architecture that uses the security properties offered by a virtual machine monitor that enforces the principle of least privilege. These security properties are a strong building block to provide trustworthy cloud computing services to cloud consumers. This chapter briefly explained about a proposed system to prevent insider attacks in cloud environment from cloud consumer and cloud service provider perspectives. The proposed framework is initiating how virtual machines are providing the most reliable security materials of the cloud computing architecture. For cloud consumers, the proposed architecture allocates the well-built security materials of the reliable cloud computing services.