Title | Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Anand, Priya, Ryoo, Jungwoo, Kim, Hyoungshick, Kim, Eunhyun |
Conference Name | Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4142-4 |
Keywords | cloud computing, expert systems, Human Behavior, pubcrawl, resilience, risk analysis, Scalability, security patterns, STRIDE-DREAD Model, Threat Assessment |
Abstract | Cloud computing has emerged as a fast-growing technology in the past few years. It provides a great flexibility for storing, sharing and delivering data over the Internet without investing on new technology or resources. In spite of the development and wide array of cloud usage, security perspective of cloud computing still remains its infancy. Security challenges faced by cloud environment becomes more complicated when we include various stakeholders' perspectives. In a cloud environment, security perspectives and requirements are usually designed by software engineers or security experts. Sometimes clients' requirements are either ignored or given a very high importance. In order to implement cloud security by providing equal importance to client organizations, software engineers and security experts, we propose a new methodology in this paper. We use Microsoft's STRIDE-DREAD model to assess threats existing in the cloud environment and also to measure its consequences. Our aim is to rank the threats based on the nature of its severity, and also giving a significant importance for clients' requirements on security perspective. Our methodology would act as a guiding tool for security experts and software engineers to proceed with securing process especially for a private or a hybrid cloud. Once threats are ranked, we provide a link to a well-known security pattern classification. Although we have some security pattern classification schemes in the literature, we need a methodology to select a particular category of patterns. In this paper, we provide a novel methodology to select a set of security patterns for securing a cloud software. This methodology could aid a security expert or a software professional to assess the current vulnerability condition and prioritize by also including client's security requirements in a cloud environment. |
URL | http://doi.acm.org/10.1145/2857546.2857552 |
DOI | 10.1145/2857546.2857552 |
Citation Key | anand_threat_2016 |