Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

T. Gunasekhar (Koneru Lakshmaiah Education Foundation, India), K. Thirupathi Rao (Koneru Lakshmaiah Education Foundation, India), P. Sai Kiran (Koneru Lakshmaiah Education Foundation, India), V. Krishna Reddy (Koneru Lakshmaiah Education Foundation, India) and B. Thirumala Rao (Koneru Lakshmaiah Education Foundation, India)
Release Date: February, 2019|Copyright: © 2019 |Pages: 113
ISBN13: 9781522579243|ISBN10: 1522579249|EISBN13: 9781522579250|DOI: 10.4018/978-1-5225-7924-3

Description

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Cloud Infrastructure
  • Empirical Attacks
  • Encoding Rules
  • Encryption-Based Approaches
  • Hypervisor
  • Public Cryptography
  • Public Key Infrastructure
  • Remote Attestation
  • Security Principles
  • Trusted Platform Module
  • Trustworthy Computing
  • Virtual Machine

Table of Contents and List of Contributors

Search this Book:
Reset