DocumentCode
606363
Title
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers
Author
Bleikertz, S. ; Mastelic, T. ; Pape, S. ; Pieters, Wolter ; Dimkov, T.
Author_Institution
IBM Res. - Zurich, Zurich, Switzerland
fYear
2013
fDate
25-27 March 2013
Firstpage
78
Lastpage
87
Abstract
Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divides insiders from outsiders, therefore making security assessments by cloud customers more difficult. In this paper, we propose a model that combines a comprehensive system model of infrastructure clouds with a security model that captures security requirements of cloud customers as well as characteristics of attackers. This combination provides a powerful tool for systematically analyzing attacks in cloud environments, supporting cloud customers in their security assessment by providing a better understanding of existing attacks and threats. Furthermore, we use the model to construct "what-if" scenarios that could possible lead to new attacks and to raise concerns about unknown threats among cloud customers.
Keywords
cloud computing; security of data; socio-economic effects; cloud battlefield; cloud computing; cloud customers; cloud services; economic benefits; security assessments; security perimeter; Analytical models; Cloud computing; Computational modeling; Hardware; Home appliances; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Engineering (IC2E), 2013 IEEE International Conference on
Conference_Location
Redwood City, CA
Print_ISBN
978-1-4673-6473-7
Type
conf
DOI
10.1109/IC2E.2013.31
Filename
6529271
Link To Document