Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 5
Abstract
The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations at a lower cost. However, when considering cloud computing, government entities must address a host of security issues (such as malicious insiders) beyond those of service cost and flexibility. The scope and objective of this paper is to analyze, evaluate and investigate the insider threat in cloud security in sensitive infrastructures as well as to propose two proactive socio-technical solutions for securing commercial and governmental cloud infrastructures. Firstly, it proposes actionable framework, techniques and practices in order to ensure that such disruptions through human threats are infrequent, of minimal duration, manageable, and cause the least damage possible. Secondly, it aims for extreme security measures to analyze and evaluate human threats related assessment methods for employee screening in certain high-risk situations using cognitive analysis technology, in particular functional Magnetic Resonance Imaging (fMRI). The significance of this research is also to counter human rights and ethical dilemmas by presenting a set of ethical and professional guidelines. The main objective of this work is to analyze related risks, identify countermeasures and present recommendations to develop a security awareness culture that will allow cloud providers to utilize effectively the benefits of this advanced techniques without sacrificing system security.
Authors and Affiliations
Farhan Sahito, Wolfgang Slany
Deep Learning Algorithm for Cyberbullying Detection
Cyberbullying is a crime where one person becomes the target of harassment and hate. Many cyberbullying detection approaches have been introduced, however, they were largely based on textual and user features. Most of th...
Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor Networks
Wireless sensor nodes are highly energy constrained devices. They have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Moreover, most of the Wireless Sensor Network (WSN)...
Issues Elicitation and Analysis of CMMI Based Process Improvement in Developing Countries Theory and Practice
Researchers have tried to find out the pattern of rising and fall of Pakistani software industry and also the reasons for what is going exactly wrong with this industry. Different studies have witnessed that in Pakistan,...
Root-Cause and Defect Analysis based on a Fuzzy Data Mining Algorithm
Manufacturing organizations have to improve the quality of their products regularly to survive in today’s competitive production environment. This paper presents a method for identification of unknown patterns between th...
Novel Geo-Location Technique for Tourism Guide and Emergency Evacuation at Grand Mosque Al Haram Makkah
Grand Mosque AL Haram is always crowded with pilgrim. The most concentration of crowd happens during Hajj season. Even the grand mosque is already furnished with a lot of route sign board, exit or emergency sign boards....