Advanced SearchSearch Tips
Mitigating Threats and Security Metrics in Cloud Computing
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Mitigating Threats and Security Metrics in Cloud Computing
Kar, Jayaprakash; Mishra, Manoj Ranjan;
  PDF(new window)
Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.
Dynamic Access Control;Risk Assessment;Security Intelligence;
 Cited by
D. V. Bernardo, "Utilizing security risk approach in managing cloud computing services," in Proceedings of 2013 16th International Conference on Network-Based Information Systems (NBiS), Gwangju, Korea, 2013, pp. 119-125.

E. Datta and N. Goyal, "Security attack mitigation framework for the cloud," in Proceedings of 2014 Annual Reliability and Maintainability Symposium (RAMS), Colorado Springs, CO, 2014, pp. 1-6.

D. R. Dos Santos, C. Merkle Westphall, and C. Becker Westphall, "A dynamic risk-based access control architecture for cloud computing," in Proceedings of 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 2014, pp. 1-9.

P. Wang, K. M. Chao, and C. C. Lo, "A novel threat and risk assessment mechanism for security controls in service management," in Proceedings of 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE), Coventry, UK, 2013, pp. 337-344.

I. Kotenko and E. Doynikova, "Security metrics for risk assessment of distributed information systems," in Proceedings of 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Berlin, 2013, pp. 646-650.

J. Kar, "Provably secure online/off-line identity-based signature scheme for wireless sensor network," IJ Network Security, vol. 16, no. 1, pp. 29-39, 2014.

M. R. Mishra, J. Kar, and B. Majhi, "Practical deployment of one-pass key establishment protocol on wireless sensor networks," International Journal of Pure and Applied Mathematics, vol. 100, no. 4, pp. 531-542, 2015.

J. Kar, "A novel construction of certificateless signcryption scheme for smart card," in Case Studies in Secure Computing Achievements and Trends. Boca Raton, FL: Taylor and Francis, 2014, pp. 437-456.

P. K. Manadhata and J. M. Wing, "An attack surface metric," IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371-386, 2011. crossref(new window)

B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, vol. 9, no. 2, pp. 50-57, 2011. crossref(new window)

D. V. Bernardo, "Security risk assessment: toward a comprehensive practical risk management," International Journal of Information and Computer Security, vol. 5, no. 2, pp. 77-104, 2012. crossref(new window)