2018
DOI: 10.1007/978-981-10-8536-9_11
|View full text |Cite
|
Sign up to set email alerts
|

Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Thus, sophisticated methods are needed to secure the Clouds. The Cloudbased environments require protocols for secure data transmission (Armbrust et al, 2010;Jain and Kumar, 2014;Oberoi and Mittal, 2018).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, sophisticated methods are needed to secure the Clouds. The Cloudbased environments require protocols for secure data transmission (Armbrust et al, 2010;Jain and Kumar, 2014;Oberoi and Mittal, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Integrity requirements of data need to be modified or discarded without the authorization. Security in terms of integrity is a most important aspect in the Cloud computing environment (Oberoi and Mittal, 2018;Giri and Gaur, 2015;Jain and Kumar, 2016). Therefore, to achieve and maintain the authentication and path integrity of the Cloud-based environments Authenticated Dynamic Routing in Cloud Networks (ADRCN) is proposed in this work.…”
Section: Introductionmentioning
confidence: 99%
“…The access of malicious insiders to critical systems increases with the levels of cloud i.e. IaaS to PaaS and SaaS [1]. Thus the systems which purely rely on the CSPs for security are more prone to M.I.…”
Section: F Malicious Insidersmentioning
confidence: 99%