Visible to the public Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection

TitleThreat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection
Publication TypeConference Paper
Year of Publication2016
AuthorsAnand, Priya, Ryoo, Jungwoo, Kim, Hyoungshick, Kim, Eunhyun
Conference NameProceedings of the 10th International Conference on Ubiquitous Information Management and Communication
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4142-4
Keywordscloud computing, expert systems, Human Behavior, pubcrawl, resilience, risk analysis, Scalability, security patterns, STRIDE-DREAD Model, Threat Assessment
AbstractCloud computing has emerged as a fast-growing technology in the past few years. It provides a great flexibility for storing, sharing and delivering data over the Internet without investing on new technology or resources. In spite of the development and wide array of cloud usage, security perspective of cloud computing still remains its infancy. Security challenges faced by cloud environment becomes more complicated when we include various stakeholders' perspectives. In a cloud environment, security perspectives and requirements are usually designed by software engineers or security experts. Sometimes clients' requirements are either ignored or given a very high importance. In order to implement cloud security by providing equal importance to client organizations, software engineers and security experts, we propose a new methodology in this paper. We use Microsoft's STRIDE-DREAD model to assess threats existing in the cloud environment and also to measure its consequences. Our aim is to rank the threats based on the nature of its severity, and also giving a significant importance for clients' requirements on security perspective. Our methodology would act as a guiding tool for security experts and software engineers to proceed with securing process especially for a private or a hybrid cloud. Once threats are ranked, we provide a link to a well-known security pattern classification. Although we have some security pattern classification schemes in the literature, we need a methodology to select a particular category of patterns. In this paper, we provide a novel methodology to select a set of security patterns for securing a cloud software. This methodology could aid a security expert or a software professional to assess the current vulnerability condition and prioritize by also including client's security requirements in a cloud environment.
URLhttp://doi.acm.org/10.1145/2857546.2857552
DOI10.1145/2857546.2857552
Citation Keyanand_threat_2016