DocumentCode
230786
Title
Threat and countermeasure patterns for cloud computing
Author
Okubo, Takanori ; Wataguchi, Yoshiro ; Kanaya, Nobuyuki
Author_Institution
Grad. Sch. of Inf. Security, Inst. of Inf. Security, Yokohama, Japan
fYear
2014
fDate
26-26 Aug. 2014
Firstpage
43
Lastpage
46
Abstract
Recently cloud computing markets have expanded, and there are various kind of services and their providers. How-ever, Security is the primary concern of cloud users. However, service providers are unaware precisely of the types of security countermeasures required for their cloud servers. A method to define what the type security required for each operator using two security patterns are proposed. One is for typical threats and the other is for typical countermeasures. Using the two patterns with the relationship information among the functions, cloud components and stakeholders, the security coverage of the cloud and the security duties of each operator become clear.
Keywords
cloud computing; security of data; cloud computing; cloud security; cloud service providers; security countermeasures; security coverage; security threats; Authentication; Cloud computing; Force; Laboratories; NIST; Servers; cloud; operation; security; security pattern; service level agree-ment;
fLanguage
English
Publisher
ieee
Conference_Titel
Requirements Patterns (RePa), 2014 IEEE 4th International Workshop on
Conference_Location
Karlskrona
Type
conf
DOI
10.1109/RePa.2014.6894843
Filename
6894843
Link To Document