Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014
DOI: 10.1145/2590296.2590310
|View full text |Cite
|
Sign up to set email alerts
|

Cyber defenses for physical attacks and insider threats in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Computer network security refers to the use of network management to control and technical measures to ensure that in a network environment, the data privacy, integrity, and availability can be protected [17]. This can be categorized into two: logic and physical security.…”
Section: Computer Network Securitymentioning
confidence: 99%
“…Computer network security refers to the use of network management to control and technical measures to ensure that in a network environment, the data privacy, integrity, and availability can be protected [17]. This can be categorized into two: logic and physical security.…”
Section: Computer Network Securitymentioning
confidence: 99%
“…The cloud provider is always trusted with the physical security of the datacenter, thus any attacks involving physical access to the infrastructure, including power and noise analysis, bus snooping, or decapping chips [33,34,75] are out of scope of a tenant's control. The provider is also trusted for the availability of the network, node allocation services, and any network performance guarantees.…”
Section: Threat Modelmentioning
confidence: 99%
“…Both of these issues arise due to failed data security measures. Data confidentiality refers to protecting the customers' data from being disclosed to illegitimate [12,16,24,25,26] Insider attacks [16,27,28,29] parties without their express approval while data integrity refers to protecting consumers' data from malicious modifications and ensuring the accuracy and consistency of data [2]. Table 2 presents the main challenges that need to be considered during the adoption and use of Cloud computing.…”
Section: Securitymentioning
confidence: 99%