CloudSafe: A tool for an automated security analysis for cloud computing
Author | An S. |
Author | Eom T. |
Author | Park J.S. |
Author | Hong J.B. |
Author | Nhlabatsi A. |
Author | Fetais N. |
Author | Khan K.M. |
Author | Kim D.S. |
Available date | 2020-04-27T08:34:19Z |
Publication Date | 2019 |
Publication Name | Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 |
Resource | Scopus |
Abstract | Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees. However, existing models do not consider all types of threats, and also automating the security assessment functions are difficult. In this paper, we propose a new security assessment tool for the cloud named CloudSafe, an automated security assessment for the cloud. The CloudSafe tool collates various tools and frameworks to automate the security assessment process. To demonstrate the applicability of the CloudSafe, we conducted security assessment in Amazon AWS, where our experimental results showed that we can effectively gather security information of the cloud and carry out security assessment to produce security reports. Users and cloud service providers can use the security report generated by the CloudSafe to understand the security posture of the cloud being used/provided. - 2019 IEEE. |
Sponsor | This paper was made possible by Grant NPRP 8-531-1-111 from Qatar National Research Fund (QNRF). The statements made herein are solely the responsibility of the authors. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Cloud computing Cloud security Graphical security models Security assessment |
Type | Conference Paper |
Pagination | 602-609 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Network & Distributed Systems [70 items ]