• DocumentCode
    232382
  • Title

    A Hybrid Protocol to Secure the Cloud from Insider Threats

  • Author

    Sriram, M. ; Patel, Vaibhav ; Harishma, D. ; Lakshmanan, Nachammai

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Nat. Inst. of Technol., Tiruchirappalli, India
  • fYear
    2014
  • fDate
    15-17 Oct. 2014
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.
  • Keywords
    cloud computing; cryptography; neural nets; outsourcing; protocols; cloud computing; cloud users; data cleaning; data outsourcing; decoy technology; enhanced neural network; hybrid protocol; insider threat attacks; selective encryption; storage services; user profiling; Cloud computing; Electronic mail; Encryption; IP networks; Neural networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cloud Computing in Emerging Markets (CCEM), 2014 IEEE International Conference on
  • Conference_Location
    Bangalore
  • Type

    conf

  • DOI
    10.1109/CCEM.2014.7015476
  • Filename
    7015476