A Survey on Insider Attacks in IAAS-Based Cloud
Keyword(s):
This chapter provides a literature review and the related work about the insider attacks and solutions in cloud environment. The authors classified solutions into three categories: trusted computing-based approaches, encryption-based approaches, and virtualization-based approaches. The trusted computing approaches use remote attestation, sealed storage, and integrity measurement. Encryption-based approaches use the cryptographic operations along with cloud computing security mechanisms and policies. Virtualization-based approaches use the virtualization technology to solve critical security issues using trusted computing approaches. At the end of this chapter, they compare various solutions and summarize the problems and solutions.
2013 ◽
Vol 321-324
◽
pp. 2657-2664
2015 ◽
Vol 1
(2)
◽
pp. 15
Keyword(s):
2014 ◽
Vol 3
(4)
◽
pp. 221-225
◽
2018 ◽
Vol 7
(2.21)
◽
pp. 355
Keyword(s):