Title
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers
Abstract
Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divides insiders from outsiders, therefore making security assessments by cloud customers more difficult. In this paper, we propose a model that combines a comprehensive system model of infrastructure clouds with a security model that captures security requirements of cloud customers as well as characteristics of attackers. This combination provides a powerful tool for systematically analyzing attacks in cloud environments, supporting cloud customers in their security assessment by providing a better understanding of existing attacks and threats. Furthermore, we use the model to construct "what-if" scenarios that could possible lead to new attacks and to raise concerns about unknown threats among cloud customers.
Year
DOI
Venue
2013
10.1109/IC2E.2013.31
Cloud Engineering
Keywords
Field
DocType
security perimeter,cloud computing,cloud service,security model,cloud customers,cloud battlefield,security concern,cloud customer,cloud environment,security assessment,captures security requirement,security assessments,infrastructure cloud,computational modeling,cloud services,security,hardware
Internet privacy,Battlefield,Computer science,Computer security,Security service,Cloud computing security,Insider,System model,Cloud testing,Computer security model,Cloud computing
Conference
ISBN
Citations 
PageRank 
978-1-4673-6473-7
5
0.69
References 
Authors
30
5
Name
Order
Citations
PageRank
Soren Bleikertz1222.00
Toni Mastelic2655.52
Sebastian Pape31710.95
Wolter Pieters422628.57
Trajce Dimkov5736.27