DocumentCode :
2447203
Title :
Inadequacies of Current Risk Controls for the Cloud
Author :
Auty, M. ; Creese, S. ; Goldsmith, M. ; Hopkins, P.
Author_Institution :
Int. Digital Lab., Univ. of Warwick, Coventry, UK
fYear :
2010
fDate :
Nov. 30 2010-Dec. 3 2010
Firstpage :
659
Lastpage :
666
Abstract :
In this paper we describe where current risk controls (as documented in ISO27001/27002) for mitigating information security risks are likely to be inadequate for use in the cloud. Such an analysis could provide a rationale for prioritizing protection research, and the work presented here is part of a larger exercise designed to identify the potential for cascade attacks in the cloud, and those areas most likely to be targeted based on both an understanding of threat motivations and likely areas of vulnerability.
Keywords :
cloud computing; security of data; cascade attacks; cloud environment; current risk controls; mitigating information security; Access control; Cloud computing; Encryption; Monitoring; Sensors; Software; Authentication; Information; Insider; Monitoring; Security; Threat; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on
Conference_Location :
Indianapolis, IN
Print_ISBN :
978-1-4244-9405-7
Electronic_ISBN :
978-0-7695-4302-4
Type :
conf
DOI :
10.1109/CloudCom.2010.49
Filename :
5708515
Link To Document :
بازگشت