Loading

Approaches for Mitigating Insider Attacks in Cloud Infrastructure
Divya Vadlamudi1, Pushpitha. M2, Sarika. G3, Tejaswini. N4

1Divya Vadlamudi, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (Andhra Pradesh), India.
2Pushpitha. M, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (Andhra Pradesh), India.
3Sarika. G, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (Andhra Pradesh), India.
4Tejaswini. N, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (Andhra Pradesh), India.
Manuscript received on 23 April 2019 | Revised Manuscript received on 05 May 2019 | Manuscript Published on 17 May 2019 | PP: 152-155 | Volume-7 Issue-6S4 April 2019 | Retrieval Number: F10290476S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now-a-days Enterprises and individuals make use of cloud services which offers them a lot of advantages from the features of cloud computing like pay-as-you-use, elastic scalability and others. By the use of Internet Cloud Consumers can be able to get the cloud services. But there are few concerns in adopting the cloud-based services for individual’s daily work. The main concern is lack of security to the cloud consumer’s data and computations performed by the consumer. Another main concern is threats from the malicious insiders like insider attacks and also from the unauthorized users like outsiders. In the current paper we have gone through different approaches for detection and prevention insider attacks.
Keywords: Cloud Computing, Insider Attacks, Outsiders.
Scope of the Article: Cloud Computing