Threat-specific security risk evaluation in the cloud
المؤلف | Nhlabatsi, Armstrong |
المؤلف | Hong, Jin B. |
المؤلف | Kim, Dong Seong |
المؤلف | Fernandez, Rachael |
المؤلف | Hussein, Alaa |
المؤلف | Fetais, Noora |
المؤلف | Khan, Khaled M. |
تاريخ الإتاحة | 2024-03-10T05:42:09Z |
تاريخ النشر | 2021 |
اسم المنشور | IEEE Transactions on Cloud Computing |
المصدر | Scopus |
الرقم المعياري الدولي للكتاب | 21687161 |
الملخص | Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific risk evaluation approach that uses various security attributes of the cloud (e.g., vulnerability information, the probability of an attack, and the impact of each attack associated with the identified threat(s)) as well as the client-specific security requirements in the cloud. Our approach allows a security administrator of the cloud provider to make fine-grained decisions for selecting mitigation strategies in order to protect the outsourced computing assets of individual clients based on their specific security needs against specific threats. This is different from the existing asset-based approaches where they do not have the functionalities to provide the security evaluation of the cloud with respect to specific threats. On the other hand, the proposed approach enables security administrators to compute a range of more effective client-specific countermeasures with respect to the importance of security requirements and threats. The experimental evaluation results demonstrate that effective security solutions vary due to specific threats prioritized by different clients for an application in the cloud. Further, the proposed approach is not limited to only the cloud-based systems, but can easily be adopted to other networked systems. We have also developed a software tool to support the proposed approach. |
راعي المشروع | This paper was made possible by Grant NPRP 8-531-1-111 from Qatar National Research Fund (QNRF). The statements made herein are solely the responsibility of the authors. |
اللغة | en |
الناشر | Institute of Electrical and Electronics Engineers Inc. |
الموضوع | Cloud computing security requirements security risk evaluation threat vulnerability |
النوع | Article |
الصفحات | 793-806 |
رقم العدد | 2 |
رقم المجلد | 9 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]
-
الشبكات وخدمات البنية التحتية للمعلومات والبيانات [70 items ]