Cloud Attack and Risk Assessment Taxonomy

被引:38
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 01期
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [31] A Risk Assessment Method for Enterprise Cloud Accounting
    Deng, Guohua
    Xu, Chang
    2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 172 - 175
  • [32] A RISK ASSESSMENT MODEL WITHIN CLOUD COMPUTING
    Neghina, Diana-Elena
    Scarlat, Emil
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 18 - +
  • [33] A Study of Risk Assessment Quantification in Cloud Computing
    Tanimoto, Shigeaki
    Sato, Ryota
    Kato, Kazuhiko
    Iwashita, Motoi
    Seki, Yoshiaki
    Sato, Hiroyuki
    Kanai, Atsushi
    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 424 - 429
  • [34] Risk Assessment Methods for Cloud Computing Platforms
    Weil, Timothy
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 545 - 547
  • [35] Offline Risk Assessment of Cloud Service Providers
    Madria, Sanjay
    Sen, Amartya
    IEEE CLOUD COMPUTING, 2015, 2 (03): : 50 - 57
  • [36] A Quantitative Methodology for Cloud Security Risk Assessment
    Basu, Srijita
    Sengupta, Anirban
    Mazumdar, Chandan
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 92 - 103
  • [37] Analysis of a cloud migration framework for offline risk assessment of cloud service providers
    Sen, Amartya
    Madria, Sanjay
    SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06) : 998 - 1021
  • [38] A RISK ASSESSMENT SCHEME OF INTELLIGNET TERMINAL BASED ON ATTACK TREE
    Wei, Fang
    Zhang, Miao
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 67 - 71
  • [39] IAF: IoT Attack Framework and Unique Taxonomy
    Bhardwaj, Akashdeep
    Kumar, Manoj
    Stephan, Thompson
    Shankar, Achyut
    Ghalib, Muhammad Rukunuddin
    Abujar, Sheikh
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (02)
  • [40] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5) : 1504 - 1513