DOI QR코드

DOI QR Code

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash (Dept. of Information Systems, Faculty of Computing & Information Technology, Information Security Research Group, King Abdulaziz University) ;
  • Mishra, Manoj Ranjan (School of Computer Application, KIIT University)
  • Received : 2015.01.29
  • Accepted : 2015.09.07
  • Published : 2016.06.30

Abstract

Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Keywords

References

  1. D. V. Bernardo, "Utilizing security risk approach in managing cloud computing services," in Proceedings of 2013 16th International Conference on Network-Based Information Systems (NBiS), Gwangju, Korea, 2013, pp. 119-125.
  2. E. Datta and N. Goyal, "Security attack mitigation framework for the cloud," in Proceedings of 2014 Annual Reliability and Maintainability Symposium (RAMS), Colorado Springs, CO, 2014, pp. 1-6.
  3. D. R. Dos Santos, C. Merkle Westphall, and C. Becker Westphall, "A dynamic risk-based access control architecture for cloud computing," in Proceedings of 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 2014, pp. 1-9.
  4. P. Wang, K. M. Chao, and C. C. Lo, "A novel threat and risk assessment mechanism for security controls in service management," in Proceedings of 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE), Coventry, UK, 2013, pp. 337-344.
  5. I. Kotenko and E. Doynikova, "Security metrics for risk assessment of distributed information systems," in Proceedings of 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Berlin, 2013, pp. 646-650.
  6. J. Kar, "Provably secure online/off-line identity-based signature scheme for wireless sensor network," IJ Network Security, vol. 16, no. 1, pp. 29-39, 2014.
  7. M. R. Mishra, J. Kar, and B. Majhi, "Practical deployment of one-pass key establishment protocol on wireless sensor networks," International Journal of Pure and Applied Mathematics, vol. 100, no. 4, pp. 531-542, 2015.
  8. J. Kar, "A novel construction of certificateless signcryption scheme for smart card," in Case Studies in Secure Computing Achievements and Trends. Boca Raton, FL: Taylor and Francis, 2014, pp. 437-456.
  9. P. K. Manadhata and J. M. Wing, "An attack surface metric," IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371-386, 2011. https://doi.org/10.1109/TSE.2010.60
  10. B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, vol. 9, no. 2, pp. 50-57, 2011. https://doi.org/10.1109/MSP.2010.115
  11. D. V. Bernardo, "Security risk assessment: toward a comprehensive practical risk management," International Journal of Information and Computer Security, vol. 5, no. 2, pp. 77-104, 2012. https://doi.org/10.1504/IJICS.2012.051775

Cited by

  1. A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments vol.7, pp.1, 2017, https://doi.org/10.1186/s13673-017-0109-2
  2. A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform vol.2018, pp.2090-0155, 2018, https://doi.org/10.1155/2018/8309450