• DocumentCode
    3728474
  • Title

    Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems

  • Author

    Mustafa Aydin;Jeremy Jacob

  • Author_Institution
    Dept. of Comput. Sci., Univ. of York, York, UK
  • fYear
    2015
  • Firstpage
    53
  • Lastpage
    60
  • Abstract
    We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their deployment, requiring information about the data, instances, connections, their properties, and the importance of various security attributes. This input is used to analyse the relevant threats, and the way they propagate through the system. They are then presented to the user, ordered according to the security attributes they have prioritised, along with the best countermeasures to secure against the dangers listed.
  • Keywords
    "Security","Cloud computing","Analytical models","Computational modeling","Risk management","Data models"
  • Publisher
    ieee
  • Conference_Titel
    Intelligence and Security Informatics Conference (EISIC), 2015 European
  • Type

    conf

  • DOI
    10.1109/EISIC.2015.11
  • Filename
    7379723