TY - GEN
T1 - Defining the cloud battlefield - supporting security assessments by cloud customers
AU - Bleikertz, Sören
AU - Mastelic, Toni
AU - Pape, Sebastian
AU - Pieters, Wolter
AU - Dimkov, T.
N1 - Foreground = 10%;
Type of activity = Conference;
Main leader = IBM;
Type of audience = scientific community;
Size of audience = 30;
Countries addressed = international;
PY - 2013/3
Y1 - 2013/3
N2 - Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divides insiders from outsiders, therefore making security assessments by cloud customers more difficult. In this paper, we propose a model that combines a comprehensive system model of infrastructure clouds with a security model that captures security requirements of cloud customers as well as characteristics of attackers. This combination provides a powerful tool for systematically analyzing attacks in cloud environments, supporting cloud customers in their security assessment by providing a better understanding of existing attacks and threats. Furthermore, we use the model to construct "what-if" scenarios that could possible lead to new attacks and to raise concerns about unknown threats among cloud customers.
AB - Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divides insiders from outsiders, therefore making security assessments by cloud customers more difficult. In this paper, we propose a model that combines a comprehensive system model of infrastructure clouds with a security model that captures security requirements of cloud customers as well as characteristics of attackers. This combination provides a powerful tool for systematically analyzing attacks in cloud environments, supporting cloud customers in their security assessment by providing a better understanding of existing attacks and threats. Furthermore, we use the model to construct "what-if" scenarios that could possible lead to new attacks and to raise concerns about unknown threats among cloud customers.
KW - EWI-24074
KW - SCS-Cybersecurity
KW - EC Grant Agreement nr.: FP7/2007-2013
KW - METIS-302561
KW - EC Grant Agreement nr.: FP7/257243
KW - EC Grant Agreement nr.: FP7/318003
KW - IR-88139
KW - EC Grant Agreement nr.: FP7/261696
U2 - 10.1109/IC2E.2013.31
DO - 10.1109/IC2E.2013.31
M3 - Conference contribution
SN - 978-1-4673-6473-7
SP - 78
EP - 87
BT - International Conference on Cloud Engineering (IC2E 2013)
PB - IEEE
CY - Piscataway, New Jersey
T2 - International Conference on Cloud Engineering, IC2E 2013
Y2 - 25 March 2013 through 27 March 2013
ER -