Understanding insider attack problem and scope in cloud | IEEE Conference Publication | IEEE Xplore