• DocumentCode
    230786
  • Title

    Threat and countermeasure patterns for cloud computing

  • Author

    Okubo, Takanori ; Wataguchi, Yoshiro ; Kanaya, Nobuyuki

  • Author_Institution
    Grad. Sch. of Inf. Security, Inst. of Inf. Security, Yokohama, Japan
  • fYear
    2014
  • fDate
    26-26 Aug. 2014
  • Firstpage
    43
  • Lastpage
    46
  • Abstract
    Recently cloud computing markets have expanded, and there are various kind of services and their providers. How-ever, Security is the primary concern of cloud users. However, service providers are unaware precisely of the types of security countermeasures required for their cloud servers. A method to define what the type security required for each operator using two security patterns are proposed. One is for typical threats and the other is for typical countermeasures. Using the two patterns with the relationship information among the functions, cloud components and stakeholders, the security coverage of the cloud and the security duties of each operator become clear.
  • Keywords
    cloud computing; security of data; cloud computing; cloud security; cloud service providers; security countermeasures; security coverage; security threats; Authentication; Cloud computing; Force; Laboratories; NIST; Servers; cloud; operation; security; security pattern; service level agree-ment;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Requirements Patterns (RePa), 2014 IEEE 4th International Workshop on
  • Conference_Location
    Karlskrona
  • Type

    conf

  • DOI
    10.1109/RePa.2014.6894843
  • Filename
    6894843