Insider threats pose serious security concerns, some of which were highlighted with the recent Snowden revelations. This book looks at the security risks associated with an insider threat in cloud computing. Specifically, it looks into the critical challenge of assuring data confidentiality and integrity for the execution of arbitrary software in a consumers virtual machine. The problem arises from having multiple virtual machines sharing hardware resources in the same physical host, while an administrator is granted elevated privileges over such host. The research presented in this book...
Insider threats pose serious security concerns, some of which were highlighted with the recent Snowden revelations. This book looks at the security ri...