Skip to main content

2018 | OriginalPaper | Buchkapitel

A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection

verfasst von : Alexandros Chrysikos, Stephen McGuire

Erschienen in: Guide to Vulnerability Analysis for Computer Networks and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 2010 24th IEEE international conference on advanced information networking and applications (AINA). Ieee, pp C27–33 Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 2010 24th IEEE international conference on advanced information networking and applications (AINA). Ieee, pp C27–33
2.
Zurück zum Zitat Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput Surv (CSUR) 46(1), 12 (2013)CrossRef Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput Surv (CSUR) 46(1), 12 (2013)CrossRef
3.
Zurück zum Zitat Abbadi IM, Martin A (2011) Trust in the cloud. information security technical report 16(3–4):108–114 Abbadi IM, Martin A (2011) Trust in the cloud. information security technical report 16(3–4):108–114
4.
Zurück zum Zitat Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 2010 7th international conference on ubiquitous intelligence & computing and 7th international conference on autonomic & trusted computing (UIC/ATC). IEEE, pp 410–415 Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 2010 7th international conference on ubiquitous intelligence & computing and 7th international conference on autonomic & trusted computing (UIC/ATC). IEEE, pp 410–415
5.
Zurück zum Zitat Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2), 50–57 (2011)CrossRef Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2), 50–57 (2011)CrossRef
6.
Zurück zum Zitat Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. J Syst Softw 86(9), 2276–2293 (2013)CrossRef Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. J Syst Softw 86(9), 2276–2293 (2013)CrossRef
7.
Zurück zum Zitat Heydari, A., Tavakoli, M.A., Riazi, M.: An overview of public cloud security issues. Int J Manag Excell 3(2), 440–445 (2014)CrossRef Heydari, A., Tavakoli, M.A., Riazi, M.: An overview of public cloud security issues. Int J Manag Excell 3(2), 440–445 (2014)CrossRef
8.
Zurück zum Zitat Catteddu D (2010) Cloud computing: benefits, risks and recommendations for information security. In: Web application security. Springer, pp 17–17 Catteddu D (2010) Cloud computing: benefits, risks and recommendations for information security. In: Web application security. Springer, pp 17–17
9.
Zurück zum Zitat Islam, S., Fenz, S., Weippl, E., Kalloniatis, C.: Migration goals and risk management in cloud computing: a review of state of the art and survey results on practitioners. Int J Secur Softw Eng (IJSSE) 7(3), 44–73 (2016)CrossRef Islam, S., Fenz, S., Weippl, E., Kalloniatis, C.: Migration goals and risk management in cloud computing: a review of state of the art and survey results on practitioners. Int J Secur Softw Eng (IJSSE) 7(3), 44–73 (2016)CrossRef
10.
Zurück zum Zitat Trappey, A.J., Trappey, C.V., Govindarajan, U.H., Sun, J.J., Chuang, A.C.: A review of technology standards and patent portfolios for enabling cyber-physical systems in advanced manufacturing. IEEE Access 4, 7356–7382 (2016)CrossRef Trappey, A.J., Trappey, C.V., Govindarajan, U.H., Sun, J.J., Chuang, A.C.: A review of technology standards and patent portfolios for enabling cyber-physical systems in advanced manufacturing. IEEE Access 4, 7356–7382 (2016)CrossRef
12.
Zurück zum Zitat Kreger H, Estefan J (2009) Navigating the soa open standards landscape around architecture. Joint Paper, The Open Group, OASIS, and OMG Kreger H, Estefan J (2009) Navigating the soa open standards landscape around architecture. Joint Paper, The Open Group, OASIS, and OMG
13.
Zurück zum Zitat Lemoudden M, Bouazza N, El Ouahidi B, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2) Lemoudden M, Bouazza N, El Ouahidi B, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2)
14.
Zurück zum Zitat Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int J Inf Secur 13(2), 113–170 (2014)CrossRef Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int J Inf Secur 13(2), 113–170 (2014)CrossRef
15.
Zurück zum Zitat Takabi, H., Joshi, J.B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6), 24–31 (2010)CrossRef Takabi, H., Joshi, J.B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6), 24–31 (2010)CrossRef
16.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl. 34(1), 1–11 (2011)CrossRef
17.
Zurück zum Zitat Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: International conference on trust, privacy and security in digital business. Springer, pp 93–104 Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: International conference on trust, privacy and security in digital business. Springer, pp 93–104
18.
Zurück zum Zitat Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: 2009. NCM’09. fifth international joint conference on INC, IMS and IDC. Ieee, pp 44–51 Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: 2009. NCM’09. fifth international joint conference on INC, IMS and IDC. Ieee, pp 44–51
19.
Zurück zum Zitat Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J Cloud Comput Adv Syst Appl 2(1), 9 (2013)CrossRef Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J Cloud Comput Adv Syst Appl 2(1), 9 (2013)CrossRef
20.
Zurück zum Zitat Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing. Springer, pp 3–42 Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing. Springer, pp 3–42
21.
Zurück zum Zitat Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 2011 ieee 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 933–939 Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 2011 ieee 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 933–939
22.
Zurück zum Zitat Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings Ieee Infocom. Ieee, pp 1–9 Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings Ieee Infocom. Ieee, pp 1–9
23.
Zurück zum Zitat Mell P, Grance T et al (2011) The nist definition of cloud computing Mell P, Grance T et al (2011) The nist definition of cloud computing
24.
Zurück zum Zitat Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.: Cloudarmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2), 367–380 (2016)CrossRef Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.: Cloudarmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2), 367–380 (2016)CrossRef
25.
Zurück zum Zitat Ghosh, N., Ghosh, S.K., Das, S.K.: Selcsp: a framework to facilitate selection of cloud service providers. IEEE Trans Cloud Comput 3(1), 66–79 (2015)CrossRef Ghosh, N., Ghosh, S.K., Das, S.K.: Selcsp: a framework to facilitate selection of cloud service providers. IEEE Trans Cloud Comput 3(1), 66–79 (2015)CrossRef
26.
Zurück zum Zitat Qu C, Buyya R (2014) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In: 2014 Ieee 28th international conference on advanced information networking and applications (aina). IEEE, pp 850–857 Qu C, Buyya R (2014) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In: 2014 Ieee 28th international conference on advanced information networking and applications (aina). IEEE, pp 850–857
27.
Zurück zum Zitat Pawar PS, Rajarajan M, Nair SK, Zisman A (2012) Trust model for optimized cloud services. In: IFIP international conference on trust management. Springer, pp 97–112 Pawar PS, Rajarajan M, Nair SK, Zisman A (2012) Trust model for optimized cloud services. In: IFIP international conference on trust management. Springer, pp 97–112
28.
Zurück zum Zitat Alhamad M, Dillon T, Chang E (2010) Sla-based trust model for cloud computing. In: 2010 13th international conference on network-based information systems (NBiS). Ieee, pp 321–324 Alhamad M, Dillon T, Chang E (2010) Sla-based trust model for cloud computing. In: 2010 13th international conference on network-based information systems (NBiS). Ieee, pp 321–324
29.
Zurück zum Zitat Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput Secur 24(1), 31–43 (2005)CrossRef Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput Secur 24(1), 31–43 (2005)CrossRef
30.
Zurück zum Zitat Hafez Amer S, Hamilton Jr, JA (2010) Intrusion detection systems (ids) taxonomy-a short review. This is a paid advertisement. STN 13-2 June 2010: Defensive Cyber Security: Policies and Procedures 2, 23 Hafez Amer S, Hamilton Jr, JA (2010) Intrusion detection systems (ids) taxonomy-a short review. This is a paid advertisement. STN 13-2 June 2010: Defensive Cyber Security: Policies and Procedures 2, 23
31.
Zurück zum Zitat Patel, A., Taghavi, M., Bakhtiyari, K., JúNior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1), 25–41 (2013)CrossRef Patel, A., Taghavi, M., Bakhtiyari, K., JúNior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1), 25–41 (2013)CrossRef
32.
Zurück zum Zitat Howard JD, Longstaff TA (1998) A common language for computer security incidents. Technical report, Sandia National Labs., Albuquerque, NM (US); Sandia National Labs., Livermore, CA (US) Howard JD, Longstaff TA (1998) A common language for computer security incidents. Technical report, Sandia National Labs., Albuquerque, NM (US); Sandia National Labs., Livermore, CA (US)
33.
Zurück zum Zitat Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: 2013 eighth international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC). IEEE, pp 276–283 Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: 2013 eighth international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC). IEEE, pp 276–283
34.
Zurück zum Zitat Bace R, Mell P (2001) Nist special publication on intrusion detection systems. Technical report, BOOZ-ALLEN AND HAMILTON INC MCLEAN VA Bace R, Mell P (2001) Nist special publication on intrusion detection systems. Technical report, BOOZ-ALLEN AND HAMILTON INC MCLEAN VA
35.
Zurück zum Zitat Humphreys, E.: Information security management standards: compliance, governance and risk management. Inf Secur Tech Rep 13(4), 247–255 (2008)CrossRef Humphreys, E.: Information security management standards: compliance, governance and risk management. Inf Secur Tech Rep 13(4), 247–255 (2008)CrossRef
36.
Zurück zum Zitat Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: Comprehensive approach to intrusion detection alert correlation. IEEE Trans Dependable Secure Comput 1(3), 146–169 (2004)CrossRef Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: Comprehensive approach to intrusion detection alert correlation. IEEE Trans Dependable Secure Comput 1(3), 146–169 (2004)CrossRef
37.
Zurück zum Zitat Shin J, Son H, Heo G (2013) Cyber security risk analysis model composed with activity-quality and architecture model. In: International conference on computer, networks and communication engineering, pp 609–612 Shin J, Son H, Heo G (2013) Cyber security risk analysis model composed with activity-quality and architecture model. In: International conference on computer, networks and communication engineering, pp 609–612
38.
Zurück zum Zitat Bolognini, L., Bistolfi, C.: Pseudonymization and impacts of big (personal/anonymous) data processing in the transition from the directive 95/46/ec to the new eu general data protection regulation. Comput Law Secur Rev 33(2), 171–181 (2017)CrossRef Bolognini, L., Bistolfi, C.: Pseudonymization and impacts of big (personal/anonymous) data processing in the transition from the directive 95/46/ec to the new eu general data protection regulation. Comput Law Secur Rev 33(2), 171–181 (2017)CrossRef
Metadaten
Titel
A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection
verfasst von
Alexandros Chrysikos
Stephen McGuire
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_4