保护云免受内部威胁的混合协议

M. Sriram, V. Patel, D. Harishma, N. Lakshmanan
{"title":"保护云免受内部威胁的混合协议","authors":"M. Sriram, V. Patel, D. Harishma, N. Lakshmanan","doi":"10.1109/CCEM.2014.7015476","DOIUrl":null,"url":null,"abstract":"Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A Hybrid Protocol to Secure the Cloud from Insider Threats\",\"authors\":\"M. Sriram, V. Patel, D. Harishma, N. Lakshmanan\",\"doi\":\"10.1109/CCEM.2014.7015476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.\",\"PeriodicalId\":143177,\"journal\":{\"name\":\"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCEM.2014.7015476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2014.7015476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

随着云计算的出现,数据外包迅速发展,其中第三方提供存储服务。内部攻击仍然继续困扰着云计算用户,因为它们往往会造成前所未有的损害,特别是当有权访问敏感信息的特权用户擅自行动时。为了保护云免受内部威胁攻击,已经提出了许多建议,但大多数标准方法已被证明不时失败。在本文中,提出了一种混合协议的实现,该协议使用选择性加密与数据清洗,基于增强神经网络的用户分析和诱饵技术来对抗内部威胁。拟议中的系统提供了前所未有的安全级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Hybrid Protocol to Secure the Cloud from Insider Threats
Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信