Trustworthy Framework for Insider Attack Prevention and Detection

Trustworthy Framework for Insider Attack Prevention and Detection

ISBN13: 9781522579243|ISBN10: 1522579249|ISBN13 Softcover: 9781522586111|EISBN13: 9781522579250
DOI: 10.4018/978-1-5225-7924-3.ch005
Cite Chapter Cite Chapter

MLA

. "Trustworthy Framework for Insider Attack Prevention and Detection." Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities, edited by T. Gunasekhar, et al., IGI Global, 2019, pp. 62-82. https://doi.org/10.4018/978-1-5225-7924-3.ch005

APA

. (2019). Trustworthy Framework for Insider Attack Prevention and Detection. In T. Gunasekhar, K. Rao, P. Kiran, V. Reddy, & B. Rao (Eds.), Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities (pp. 62-82). IGI Global. https://doi.org/10.4018/978-1-5225-7924-3.ch005

Chicago

. "Trustworthy Framework for Insider Attack Prevention and Detection." In Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities, edited by T. Gunasekhar, et al., 62-82. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7924-3.ch005

Export Reference

Mendeley
Favorite

Abstract

This chapter introduces a trustworthy cloud computing architecture that uses the security properties offered by a virtual machine monitor that enforces the principle of least privilege. These security properties are a strong building block to provide trustworthy cloud computing services to cloud consumers. This chapter briefly explained about a proposed system to prevent insider attacks in cloud environment from cloud consumer and cloud service provider perspectives. The proposed framework is initiating how virtual machines are providing the most reliable security materials of the cloud computing architecture. For cloud consumers, the proposed architecture allocates the well-built security materials of the reliable cloud computing services.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.