Pregled bibliografske jedinice broj: 1041602
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers // Proceedings of the IEEE International Conference on Cloud Engineering, IC2E 2013
Redwood City (CA): Institute of Electrical and Electronics Engineers (IEEE), 2013. str. 78-87 doi:10.1109/IC2E.2013.31 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 1041602 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers
Autori
Sören Bleikertz ; Toni Mastelić ; Sebastian Pape ; Wolter Pieters ; Trajce Dimkov
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Proceedings of the IEEE International Conference on Cloud Engineering, IC2E 2013
/ - Redwood City (CA) : Institute of Electrical and Electronics Engineers (IEEE), 2013, 78-87
ISBN
978-1-4673-6473-7
Skup
2013 IEEE International Conference on Cloud Engineering (IC2E)
Mjesto i datum
Redwood City (CA), Sjedinjene Američke Države, 25.03.2013. - 27.03.2013
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
cloud ; security ; customers
Sažetak
Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divides insiders from outsiders, therefore making security assessments by cloud customers more difficult. In this paper, we propose a model that combines a comprehensive system model of infrastructure clouds with a security model that captures security requirements of cloud customers as well as characteristics of attackers. This combination provides a powerful tool for systematically analyzing attacks in cloud environments, supporting cloud customers in their security assessment by providing a better understanding of existing attacks and threats. Furthermore, we use the model to construct "what-if" scenarios that could possible lead to new attacks and to raise concerns about unknown threats among cloud customers.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo