Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2857546.2857552acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection

Published: 04 January 2016 Publication History

Abstract

Cloud computing has emerged as a fast-growing technology in the past few years. It provides a great flexibility for storing, sharing and delivering data over the Internet without investing on new technology or resources. In spite of the development and wide array of cloud usage, security perspective of cloud computing still remains its infancy. Security challenges faced by cloud environment becomes more complicated when we include various stakeholders' perspectives. In a cloud environment, security perspectives and requirements are usually designed by software engineers or security experts. Sometimes clients' requirements are either ignored or given a very high importance. In order to implement cloud security by providing equal importance to client organizations, software engineers and security experts, we propose a new methodology in this paper. We use Microsoft's STRIDE-DREAD model to assess threats existing in the cloud environment and also to measure its consequences. Our aim is to rank the threats based on the nature of its severity, and also giving a significant importance for clients' requirements on security perspective. Our methodology would act as a guiding tool for security experts and software engineers to proceed with securing process especially for a private or a hybrid cloud. Once threats are ranked, we provide a link to a well-known security pattern classification. Although we have some security pattern classification schemes in the literature, we need a methodology to select a particular category of patterns. In this paper, we provide a novel methodology to select a set of security patterns for securing a cloud software. This methodology could aid a security expert or a software professional to assess the current vulnerability condition and prioritize by also including client's security requirements in a cloud environment.

References

[1]
Cve details. http://www.cvedetails.com/vulnerability-list/vendor_id-6276/XEN.html.
[2]
B. Arief and D. Besnard. Technical and human issues in computer-based systems security. Technical Report Series-University of Newcastle upon Tyne Computing Science, 2003.
[3]
T. Aven. A unified framework for risk and vulnerability analysis covering both safety and security. Reliability Engineering & System Safety, 2007.
[4]
P. L. Bannerman. Risk and risk management in software projects: A reassessment. Journal of Systems and Software, 2008.
[5]
P. T. Devanbu and S. Stubblebine. Software engineering for security: a roadmap. In Proceedings of the Conference on the Future of Software Engineering. ACM, 2000.
[6]
D. D. et al. Characterizing the 'security vulnerability likelihood' of software functions. In Proceedings International Conference on Software Maintenance. IEEE, 2003.
[7]
F. F. et al. Managing vulnerabilities of information systems to security incidents. In Proceeding of the 5th international conference on Electronic commerce, ACM, 2003.
[8]
P. C. et al. Documenting Software Architectures: Views and Beyond. Pearson Education, 2002.
[9]
E. B. Fernandez. A methodology for secure software design. In Proceedings of the International Conference on Software Engineering Research and Practice, 2004.
[10]
M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, 2002.
[11]
S. Kaplan. Risk assessment and risk management-basic concepts and terminology. Risk Management: Expanding Horizons In Nuclear Power and Other Indurstries, 1991.
[12]
S. Kaplan. The words of risk analysis. Risk analysis, 1997.
[13]
S. Kaplan and B. J. Garrick. On the quantitative definition of risk. Risk analysis, 1981.
[14]
I. Lioupras and E. Manthou. Don't let my Heart bleed!: An event study methodology in Heartbleed vulnerability case. Informatik Student Paper Master (INFSPM), 2014.
[15]
W. W. Lowrance. Of Acceptable Risk: Science and the Determination of Safety. William Kaufmann, 1976.
[16]
G. McGraw. Software Security. IEEE Security & Privacy, 2004.
[17]
P. A. Munawar Hafiz and R. E. Johnson. Organizing security patterns. Software, IEEE, 2007.
[18]
M. D. Ryan. Cloud computing security: The scientific challenge, and a survey of solutions. In Journal of Systems and Software, 2013.
[19]
N. S. Telecommunications and I. S. Security. National training standars for information systems security (infosec) professionals. www.cnss.gov/Assets/pdf/nstissi_4011.pdf, June 1994.
[20]
M. Whitman and H. Mattord. Principles of information security. Cengage Learning, 2011.
[21]
H. Zhang. A redefinition of the project risk process: Using vulnerability to open up the event-consequence link. International Journal of Project Management, 2007.
[22]
E. Zio. An introduction to the basics of reliability and risk analysis. World scientific, 2007.

Cited By

View all
  • (2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
  • (2022)Systematic analysis of software development in cloud computing perceptionsJournal of Software: Evolution and Process10.1002/smr.2485Online publication date: 29-Jun-2022
  • (2021)Systematic Literature Review of Security Pattern ResearchInformation10.3390/info1201003612:1(36)Online publication date: 16-Jan-2021
  • Show More Cited By

Index Terms

  1. Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication
      January 2016
      658 pages
      ISBN:9781450341424
      DOI:10.1145/2857546
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 January 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Cloud Computing
      2. Risk Analysis
      3. STRIDE-DREAD Model
      4. Security Patterns
      5. Threat Assessment

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      IMCOM '16
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 213 of 621 submissions, 34%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 14 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
      • (2022)Systematic analysis of software development in cloud computing perceptionsJournal of Software: Evolution and Process10.1002/smr.2485Online publication date: 29-Jun-2022
      • (2021)Systematic Literature Review of Security Pattern ResearchInformation10.3390/info1201003612:1(36)Online publication date: 16-Jan-2021
      • (2021)A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplacesInternational Journal of Information Security10.1007/s10207-021-00566-321:3(509-525)Online publication date: 14-Sep-2021
      • (2019)Threat Modeling and Analysis of Voice Assistant ApplicationsG Protein-Coupled Receptor Signaling10.1007/978-3-030-17982-3_16(197-209)Online publication date: 12-Apr-2019
      • (2017)A trust management system model for cloud2017 International Symposium on Networks, Computers and Communications (ISNCC)10.1109/ISNCC.2017.8072029(1-6)Online publication date: May-2017
      • (2017)Determining security requirements for cloud-supported routing of physical goods2017 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2017.8228691(514-521)Online publication date: Oct-2017

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media