Cloud Attack and Risk Assessment Taxonomy

被引:38
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 01期
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [1] Risk Assessment in a Sensor Cloud Framework Using Attack Graphs
    Sen, Amartya
    Madria, Sanjay
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (06) : 942 - 955
  • [2] Security and Risk Assessment in the Cloud
    Madria, Sanjay K.
    COMPUTER, 2016, 49 (09) : 110 - 113
  • [3] Implementation approach for IDS based on risk assessment and attack pattern in cloud computing
    Ben Charhi, Youssef
    Bendriss, Elmehdi
    Mannane, Nada
    Regragui, Boubker
    2018 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD), 2018,
  • [4] Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
    Chimuco, Francisco T.
    Sequeiros, Joao B. F.
    Lopes, Carolina Galvao
    Simoes, Tiago M. C.
    Freire, Mario M.
    Inacio, Pedro R. M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 833 - 867
  • [5] Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
    Francisco T. Chimuco
    João B. F. Sequeiros
    Carolina Galvão Lopes
    Tiago M. C. Simões
    Mário M. Freire
    Pedro R. M. Inácio
    International Journal of Information Security, 2023, 22 : 833 - 867
  • [6] Risk Assessment for Big Data in Cloud: Security, Privacy and Trust
    Ali, Hazirah Bee Bt Yusof
    Abdullah, Lili Marziana Bt
    Kartiwi, Mira
    Nordin, Azlin
    PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 63 - 67
  • [7] RISK ASSESSMENT METHOD OF CLOUD ENVIRONMENT
    Zboril, Martin
    COMPUTING AND INFORMATICS, 2022, 41 (05) : 1186 - 1206
  • [8] A CLOUD ADOPTION RISK ASSESSMENT MODEL
    Cayirci, Erdal
    Garaga, Alexandr
    de Oliveira, Anderson Santana
    Roudier, Yves
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 908 - 913
  • [9] Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing
    Youssef B.C.
    Nada M.
    Boubker R.
    International Journal of Information and Computer Security, 2019, 11 (4-5) : 315 - 331
  • [10] Unifying traditional risk assessment approaches with attack trees
    Paul, Stephane
    Vignon-Davillier, Raphael
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (03) : 165 - 181