DocumentCode :
232382
Title :
A Hybrid Protocol to Secure the Cloud from Insider Threats
Author :
Sriram, M. ; Patel, Vaibhav ; Harishma, D. ; Lakshmanan, Nachammai
Author_Institution :
Dept. of Comput. Sci. & Eng., Nat. Inst. of Technol., Tiruchirappalli, India
fYear :
2014
fDate :
15-17 Oct. 2014
Firstpage :
1
Lastpage :
5
Abstract :
Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.
Keywords :
cloud computing; cryptography; neural nets; outsourcing; protocols; cloud computing; cloud users; data cleaning; data outsourcing; decoy technology; enhanced neural network; hybrid protocol; insider threat attacks; selective encryption; storage services; user profiling; Cloud computing; Electronic mail; Encryption; IP networks; Neural networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing in Emerging Markets (CCEM), 2014 IEEE International Conference on
Conference_Location :
Bangalore
Type :
conf
DOI :
10.1109/CCEM.2014.7015476
Filename :
7015476
Link To Document :
بازگشت