Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No.5, 2013

9 Pages Posted: 7 Aug 2013

See all articles by Farhan Sahito

Farhan Sahito

Graz University of Technology - Institute for Software Technology

Wolfgang Slany

Graz University of Technology - Institute for Software Technology

Date Written: June 1, 2013

Abstract

The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations at a lower cost. However, when considering cloud computing, government entities must address a host of security issues (such as malicious insiders) beyond those of service cost and flexibility. The scope and objective of this paper is to analyze, evaluate and investigate the insider threat in cloud security in sensitive infrastructures as well as to propose two proactive socio-technical solutions for securing commercial and governmental cloud infrastructures. Firstly, it proposes actionable framework, techniques and practices in order to ensure that such disruptions through human threats are infrequent, of minimal duration, manageable, and cause the least damage possible. Secondly, it aims for extreme security measures to analyze and evaluate human threats related assessment methods for employee screening in certain high-risk situations using cognitive analysis technology, in particular functional Magnetic Resonance Imaging (fMRI). The significance of this research is also to counter human rights and ethical dilemmas by presenting a set of ethical and professional guidelines. The main objective of this work is to analyze related risks, identify countermeasures and present recommendations to develop a security awareness culture that will allow cloud providers to utilize effectively the benefits of this advanced techniques without sacrificing system security.

Keywords: Cloud Computing, Human Threats, Multi Layered Security Strategy, Employee Screening, fMRI

Suggested Citation

Sahito, Farhan and Slany, Wolfgang, Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments (June 1, 2013). International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No.5, 2013, Available at SSRN: https://ssrn.com/abstract=2305855

Farhan Sahito (Contact Author)

Graz University of Technology - Institute for Software Technology ( email )

Institute for Software Technology
Graz University of Technology,
Graz, Styria 8100
Austria

HOME PAGE: http://www.ist.tugraz.at/farhansahito.html

Wolfgang Slany

Graz University of Technology - Institute for Software Technology ( email )

Institute for Software Technology
Graz University of Technology,
Graz, Styria 8100
Austria

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
128
Abstract Views
1,076
Rank
425,828
PlumX Metrics