Applying a Threat Model to Cloud Computing

被引:0
|
作者
Urias, Vincent E. [1 ]
Van Leeuwen, Brian [1 ]
Stout, William M. S. [1 ]
Lin, Han [1 ]
机构
[1] Sandia Natl Labs, POB 5800, Albuquerque, NM 87185 USA
来源
2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST) | 2018年
关键词
cloud computing; cyber security; cyber threat;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud infrastructure presents new paradigms in efficiency and economy, but also bring along a new threat surface for cyber defenders to contend with. Each unique cloud computing model varies the characteristics of the cloud platform when compared to the traditional on-premise computing network. Characteristics such as shared security responsibility between the cloud provider and tenant, reduced levels of cyber visibility and response capability, on-demand computing resources, cloud-based and more complex identity and access management, and various other characteristics impact the results of applying a threat model to the cloud computing platform. Thus, the threat modeling of cloud platforms must consider a new model of shared responsibility. The threat model should recognize an approach that requires the end user to explicitly trust the cloud service provider in their respective areas of responsibility, and must consider new or modified threats. Organizations migrating their computer network from a more traditional on-premise system to cloud-based services must consider the classes of threats that any computer network faces, but also the impacts resulting from cloud unique characteristics. In this paper, we select and apply a threat model to a cloud platform. Specific cloud unique characteristics are identified, and discussions on their impact to the threat model results are described.
引用
收藏
页码:6 / 10
页数:5
相关论文
共 50 条
  • [1] Above the Cloud Computing: Applying Cloud Computing Principles to Create an Orbital Services Model
    Straub, Jeremy
    Mohammad, Atif
    Berk, Josh
    Nervold, Anders Kose
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VI, 2013, 8739
  • [2] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [3] APPLYING CLOUD COMPUTING MODEL IN HEALTH EDUCATION SYSTEM IN IRAN
    Sepehri, F.
    Sepehri, Z.
    Sepehri, M.
    Rakhshani, F.
    Mohammadi, M.
    Rakhshani, T.
    Kohan, F.
    Aloosh, O.
    7TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED2013), 2013, : 4977 - 4977
  • [4] A Novel Penalty Model for Managing and Applying Penalties in Cloud Computing
    Maarouf, Adil
    El Qacimy, Bouchra
    Marzouk, Abderrahim
    Haqiq, Abdelkrim
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [5] Issues in applying model based process improvement in the cloud computing domain
    Cade, Jeremy, 1600, Springer Verlag (477): : 238 - 249
  • [6] Cloud Computing: Applying Issues in Small
    Khalid, Ammar
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 278 - 281
  • [7] The Device Cloud - Applying Cloud Computing Concepts to the Internet of Things
    Renner, Thomas
    Kliem, Andreas
    Kao, Odej
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 396 - 401
  • [8] Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness
    Sabri, Omar
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (02) : 49 - 54
  • [9] The geospatial data cloud: An implementation of applying cloud computing in geosciences
    Wang, Xuezhi
    Zhao, Jianghua
    Zhou, Yuanchun
    Li, Jianhui
    1600, Committee on Data for Science and Technology (13): : 254 - 264
  • [10] Recent trends in applying TPM to cloud computing
    Hosseinzadeh, Shohreh
    Sequeiros, Bernardo
    Inacio, Pedro R. M.
    Leppanen, Ville
    SECURITY AND PRIVACY, 2020, 3 (01)