{"title":"A Hybrid Protocol to Secure the Cloud from Insider Threats","authors":"M. Sriram, V. Patel, D. Harishma, N. Lakshmanan","doi":"10.1109/CCEM.2014.7015476","DOIUrl":null,"url":null,"abstract":"Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2014.7015476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.