DocumentCode :
230786
Title :
Threat and countermeasure patterns for cloud computing
Author :
Okubo, Takanori ; Wataguchi, Yoshiro ; Kanaya, Nobuyuki
Author_Institution :
Grad. Sch. of Inf. Security, Inst. of Inf. Security, Yokohama, Japan
fYear :
2014
fDate :
26-26 Aug. 2014
Firstpage :
43
Lastpage :
46
Abstract :
Recently cloud computing markets have expanded, and there are various kind of services and their providers. How-ever, Security is the primary concern of cloud users. However, service providers are unaware precisely of the types of security countermeasures required for their cloud servers. A method to define what the type security required for each operator using two security patterns are proposed. One is for typical threats and the other is for typical countermeasures. Using the two patterns with the relationship information among the functions, cloud components and stakeholders, the security coverage of the cloud and the security duties of each operator become clear.
Keywords :
cloud computing; security of data; cloud computing; cloud security; cloud service providers; security countermeasures; security coverage; security threats; Authentication; Cloud computing; Force; Laboratories; NIST; Servers; cloud; operation; security; security pattern; service level agree-ment;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Requirements Patterns (RePa), 2014 IEEE 4th International Workshop on
Conference_Location :
Karlskrona
Type :
conf
DOI :
10.1109/RePa.2014.6894843
Filename :
6894843
Link To Document :
بازگشت