Abstract
Many critical infrastructure systems have begun to store their data in cloud due to the many advantages offered by cloud computing. Unfortunately, data in these critical infrastructure systems have become one of the major targets of attackers. Since critical infrastructure data are highly connected and interdependent, the initial damage done by an attacker spreads quickly through the system when valid transactions make any updates based on the value of a damaged object. In this work, we focus on optimizing the damage assessment and recovery procedure by quickly determining the spread of damage. Once the affected area is determined, all those data items are blocked to stop the further spread of damage. This is followed by the recovery of the damaged data. Through simulation, we proved that the model expedites the process significantly.