SpiralSRA: A threat-specific security risk assessment framework for the cloud
Author | Nhlabatsi A. |
Author | Hong J.B. |
Author | Kim D.S. |
Author | Fernandez R. |
Author | Fetais N. |
Author | Khan K.M. |
Available date | 2020-03-18T08:10:08Z |
Publication Date | 2018 |
Publication Name | Proceedings - 2018 IEEE 18th International Conference on Software Quality, Reliability, and Security, QRS 2018 |
Resource | Scopus |
Abstract | Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk assessment approach in assessing the risk of all of its clients. In practice, the threats faced by each client may vary depending on their security requirements. The cloud provider may also apply generic mitigation strategies that are not guaranteed to be effective in thwarting specific threats for different clients. This paper proposes a threat-specific risk assessment framework which evaluates the security risk with respect to specific threats by considering only those threats that are relevant to a particular cloud client. The risk assessment process is divided into three phases which have inter-related activities arranged in a spiral. An application of the framework to a cloud deployment case study shows that considering risk with respect to specific threats leads to a more accurate quantification of security risk. Although our framework is motivated by security risk assessment challenges in the cloud it can be applied in any network environment. ? 2018 IEEE. |
Sponsor | ACKNOWLEDGMENT This paper was made possible by Grant NPRP 8-531-1-111 from Qatar National Research Fund (QNRF). The statements made herein are solely the responsibility of the authors. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | assessment framework cloud |
Type | Conference Paper |
Pagination | 367 - 374 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Information Intelligence [93 items ]