Cloud Computing Services

Behavioral Profiling for Transparent Verification in Cloud Storage Services

Abstract:

Security is still the most sensitive issue in cloud storage services as services remain accessible to users for prolonged periods following an initial (usually simple) authentication. This issue has led to an increased vulnerability to potential attacks and sensitive customer information being misused. To that end, this paper investigates behavioural profiling for continuous and transparent authentication and assesses the legitimacy of users while they interact with an example cloud service—Dropbox. 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com