The Library
A multi-dimension taxonomy of insider threats in cloud computing
Tools
Alhanahnah, Mohannad J., Jhumka, Arshad and Alouneh, Sahel (2016) A multi-dimension taxonomy of insider threats in cloud computing. The Computer Journal, 59 (11). pp. 1612-1622. doi:10.1093/comjnl/bxw020 ISSN 0010-4620.
PDF
WRAP_0381471-cs-140516-taxonomy.pdf - Accepted Version - Requires a PDF viewer. Download (2432Kb) |
Official URL: http://dx.doi.org/10.1093/comjnl/bxw020
Abstract
Security is considered a significant deficiency in cloud computing, and insider threats problem exacerbate security concerns in the cloud. In addition to that, cloud computing is very complex by itself, because it encompasses numerous technologies and concepts. Apparently, overcoming these challenges requires substantial efforts from information security researchers to develop powerful mitigation solutions for this emerging problem. This entails developing a taxonomy of insider threats in cloud environments encompassing all potential abnormal activities in the cloud, and can be useful for conducting security assessment. This paper describes the first phase of an ongoing research to develop a framework for mitigating insider threats in cloud computing environments. Primarily, it presents a multidimensional taxonomy of insider threats in cloud computing, and demonstrates its viability. The taxonomy provides a fundamental understanding for this complicated problem by identifying five dimensions, it also supports security engineers in identifying hidden paths, thus determining proper countermeasures, and presents a guidance covers all bounders of insiders threats issue in clouds, hence it facilitates researchers’ endeavours in tackling this problem. For instance, according to the hierarchical taxonomy, clearly many significant issues exist in public cloud, while conventional insider mitigation solutions can be used in private clouds. Finally, the taxonomy assists in identifying future research directions in this emerging area.
Item Type: | Journal Article | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||||
Library of Congress Subject Headings (LCSH): | Cloud computing -- Security measures -- Classification, Computer security | ||||||||||
Journal or Publication Title: | The Computer Journal | ||||||||||
Publisher: | Oxford University Press | ||||||||||
ISSN: | 0010-4620 | ||||||||||
Official Date: | 3 November 2016 | ||||||||||
Dates: |
|
||||||||||
Volume: | 59 | ||||||||||
Number: | 11 | ||||||||||
Page Range: | pp. 1612-1622 | ||||||||||
DOI: | 10.1093/comjnl/bxw020 | ||||||||||
Status: | Peer Reviewed | ||||||||||
Publication Status: | Published | ||||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||||
Date of first compliant deposit: | 16 May 2016 | ||||||||||
Date of first compliant Open Access: | 17 June 2017 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year