TY - GEN
T1 - MITIS - An Insider Threats Mitigation Framework for Information Systems
AU - Ali, Ahmad
AU - Ahmed, Mansoor
AU - Ilyas, Muhammad
AU - Küng, Josef
PY - 2017/11
Y1 - 2017/11
N2 - Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing instead of distributed computing. It has provided an efficient and flexible way for dynamic services meeting needs and challenges of the time in cost effective manners. Virtual environments provided the opportunity to migrate traditional systems to the cloud. Cloud service providers and Administrators generally have full access on Virtual Machines (VMs) whereas tenants have limited access on respective VMs. Cloud Admins as well as remote administrators also have full access rights on respective resources and may pose severe insiders threats on which tenants haven shown their concerns. Securing these resources are the key issues. In this paper, available practices for cloud security are investigated and a self-managed framework is introduced to mitigate malicious insider threats posed to these virtual environments
AB - Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing instead of distributed computing. It has provided an efficient and flexible way for dynamic services meeting needs and challenges of the time in cost effective manners. Virtual environments provided the opportunity to migrate traditional systems to the cloud. Cloud service providers and Administrators generally have full access on Virtual Machines (VMs) whereas tenants have limited access on respective VMs. Cloud Admins as well as remote administrators also have full access rights on respective resources and may pose severe insiders threats on which tenants haven shown their concerns. Securing these resources are the key issues. In this paper, available practices for cloud security are investigated and a self-managed framework is introduced to mitigate malicious insider threats posed to these virtual environments
UR - https://www.scopus.com/pages/publications/85036470972
U2 - 10.1007/978-3-319-70004-5_29
DO - 10.1007/978-3-319-70004-5_29
M3 - Conference proceedings
VL - 10646
T3 - Lecture Notes in Computer Science (LNCS)
SP - 407
EP - 415
BT - Future Data and Security Engineering ,International Conference on Future Data and Security Engineering FDSE 2017
A2 - Springer, null
ER -