Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

Abstract

The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations at a lower cost. However, when considering cloud computing, government entities must address a host of security issues (such as malicious insiders) beyond those of service cost and flexibility. The scope and objective of this paper is to analyze, evaluate and investigate the insider threat in cloud security in sensitive infrastructures as well as to propose two proactive socio-technical solutions for securing commercial and governmental cloud infrastructures. Firstly, it proposes actionable framework, techniques and practices in order to ensure that such disruptions through human threats are infrequent, of minimal duration, manageable, and cause the least damage possible. Secondly, it aims for extreme security measures to analyze and evaluate human threats related assessment methods for employee screening in certain high-risk situations using cognitive analysis technology, in particular functional Magnetic Resonance Imaging (fMRI). The significance of this research is also to counter human rights and ethical dilemmas by presenting a set of ethical and professional guidelines. The main objective of this work is to analyze related risks, identify countermeasures and present recommendations to develop a security awareness culture that will allow cloud providers to utilize effectively the benefits of this advanced techniques without sacrificing system security.

Authors and Affiliations

Farhan Sahito, Wolfgang Slany

Keywords

Related Articles

Deep Learning Algorithm for Cyberbullying Detection

Cyberbullying is a crime where one person becomes the target of harassment and hate. Many cyberbullying detection approaches have been introduced, however, they were largely based on textual and user features. Most of th...

 Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor Networks

 Wireless sensor nodes are highly energy constrained devices. They have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Moreover, most of the Wireless Sensor Network (WSN)...

Issues Elicitation and Analysis of CMMI Based Process Improvement in Developing Countries Theory and Practice

Researchers have tried to find out the pattern of rising and fall of Pakistani software industry and also the reasons for what is going exactly wrong with this industry. Different studies have witnessed that in Pakistan,...

Root-Cause and Defect Analysis based on a Fuzzy Data Mining Algorithm

Manufacturing organizations have to improve the quality of their products regularly to survive in today’s competitive production environment. This paper presents a method for identification of unknown patterns between th...

Novel Geo-Location Technique for Tourism Guide and Emergency Evacuation at Grand Mosque Al Haram Makkah

Grand Mosque AL Haram is always crowded with pilgrim. The most concentration of crowd happens during Hajj season. Even the grand mosque is already furnished with a lot of route sign board, exit or emergency sign boards....

Download PDF file
  • EP ID EP141051
  • DOI 10.14569/IJACSA.2013.040502
  • Views 99
  • Downloads 0

How To Cite

Farhan Sahito, Wolfgang Slany (2013). Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments. International Journal of Advanced Computer Science & Applications, 4(5), 12-20. https://europub.co.uk/articles/-A-141051