SpiralSRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

被引:3
|
作者
Nhlabatsi, Armstrong [1 ]
Hong, Jin B. [2 ]
Kim, Dong Seong [3 ]
Fernandez, Rachael [1 ]
Fetais, Noora [1 ]
Khan, Khaled M. [1 ]
机构
[1] Qatar Univ, KINDI Ctr, Collage Engn, Doha, Qatar
[2] Univ Western Australia, Dept Comp Sci & Software Engn, Nedlands, WA, Australia
[3] Univ Canterbury, Dept Comp Sci & Software Engn, Christchurch, New Zealand
关键词
REQUIREMENTS; MANAGEMENT;
D O I
10.1109/QRS.2018.00049
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk assessment approach in assessing the risk of all of its clients. In practice, the threats faced by each client may vary depending on their security requirements. The cloud provider may also apply generic mitigation strategies that are not guaranteed to be effective in thwarting specific threats for different clients. This paper proposes a threat-specific risk assessment framework which evaluates the security risk with respect to specific threats by considering only those threats that are relevant to a particular cloud client. The risk assessment process is divided into three phases which have inter-related activities arranged in a spiral. An application of the framework to a cloud deployment case study shows that considering risk with respect to specific threats leads to a more accurate quantification of security risk. Although our framework is motivated by security risk assessment challenges in the cloud it can be applied in any network environment.
引用
收藏
页码:367 / 374
页数:8
相关论文
共 50 条
  • [31] Research on the Security Risk Assessment and the Solutions of Cloud Computing
    Ding, Wen
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 481 - 486
  • [32] A Method of the Cloud Computing Security Management Risk Assessment
    Wang, Hongbing
    Liu, Feng
    Liu, Heng
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2012, 141 : 609 - +
  • [33] Threat risk analysis for cloud security based on Attack-Defense Trees
    Wang, Ping
    Lin, Hui-Tang
    Wang, Tzu Chia
    Lin, Wen-Hui
    Kuo, Pu-Tsun
    International Journal of Advancements in Computing Technology, 2012, 4 (17) : 607 - 617
  • [34] Overall cloud computing security risk assessment analysis
    Liu, Heng
    Wang, Hongbing
    Wang, Yong
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1521 - 1528
  • [35] A Review of Security Risk Assessment Methods in Cloud Computing
    Alturkistani, Fatimah M.
    Emam, Ahmed Z.
    NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2014, 275 : 443 - 453
  • [36] Security Risk Assessment on Cloud: A Systematic Mapping Study
    Annunziata, Giusy
    Sheykina, Alexandra
    Palomba, Fabio
    De Lucia, Andrea
    Catolino, Gemma
    Ferrucci, Filomena
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 604 - 613
  • [37] Cloud Threat Defense - a Threat Protection and Security Compliance Solution
    Bharadwaj, Deepak R.
    Bhattacharya, Anamika
    Chakkaravarthy, Manivannan
    2018 SEVENTH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2018, : 95 - 99
  • [38] Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method
    Samy, Ganthan Narayana
    Shanmugam, Bharanidharan
    Maarop, Nurazean
    Magalingam, Pritheega
    Perumal, Sundresan
    Albakri, Sameer Hasan
    Ahmad, Rabiah
    ADVANCED SCIENCE LETTERS, 2018, 24 (01) : 739 - 743
  • [39] Threat-specific maltreatment exposure: Comparison of measurement models and associations with internalizing, externalizing, and PTSD symptoms
    Lombera, Augustine, III
    Lee, Amy Hyoeun
    Sharma-Patel, Komal
    Brown, Elissa J.
    CHILD ABUSE & NEGLECT, 2021, 115
  • [40] Cloud Security Requirement Based Threat Analysis
    Taha, Ahmed
    Lawall, Alexander
    Suri, Neeraj
    2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 506 - 510