DocumentCode
232382
Title
A Hybrid Protocol to Secure the Cloud from Insider Threats
Author
Sriram, M. ; Patel, Vaibhav ; Harishma, D. ; Lakshmanan, Nachammai
Author_Institution
Dept. of Comput. Sci. & Eng., Nat. Inst. of Technol., Tiruchirappalli, India
fYear
2014
fDate
15-17 Oct. 2014
Firstpage
1
Lastpage
5
Abstract
Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.
Keywords
cloud computing; cryptography; neural nets; outsourcing; protocols; cloud computing; cloud users; data cleaning; data outsourcing; decoy technology; enhanced neural network; hybrid protocol; insider threat attacks; selective encryption; storage services; user profiling; Cloud computing; Electronic mail; Encryption; IP networks; Neural networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Computing in Emerging Markets (CCEM), 2014 IEEE International Conference on
Conference_Location
Bangalore
Type
conf
DOI
10.1109/CCEM.2014.7015476
Filename
7015476
Link To Document