Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3022227.3022319acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

An optimal investment scheme based on ATM considering cloud security environment

Published: 05 January 2017 Publication History

Abstract

There is an increasing use of cloud computing in information technology (IT) with the widening scope of cloud computing. However, some service owners are reluctant to adopt cloud computing because the associated security technologies have not yet matured. Cloud service providers need to invest in security to improve the use of cloud computing. Additionally, research on the security investment in cloud computing is still in its early stages; due to the lack of related work, most companies or organizations should not provide an unlimited budget for security investment. Therefore, we devised an optimal investment scheme for constructing cloud security services that considers budget and the features of cloud computing services. This scheme includes an evaluation of security vulnerabilities concerning potential security attacks, and we performed an evaluation of a security investment strategy based on attack tree map (ATM) that analyze cloud security threat and vulnerabilities. Finally, we demonstrated the proposed scheme by examining two case studies using different security investment strategies.

References

[1]
D. C. Wyld, Moving to the cloud: An introduction to cloud computing in government. IBM Center, 2009.
[2]
J. Liang, "Government Cloud: Enhancing Efficiency of E-Government and Providing Better Public Services", 2012 IJCSS.
[3]
D. G. Chandra, et al. "Cloud Computing Model for National E-governance Plan (NeGP)", 2012 CICN.
[4]
Fazal-e-Amin, et al. "Cloud Based C4I Systems: Security Requirements and Concerns", 2014
[5]
L. A. Gordon, M. P. Loeb, "The Economics of Information Security Investment", ACM Transaction InfoSystem Secure, 2002.
[6]
W. Sonnenreich, et al. "Return on security investment (ROSI)-a practical quantitative model", J. Res. Pract. Inf. Technol., 2006.
[7]
C. Gollier, "Expected net present value, expected net future value, and the Ramsey rule", J. Environ. Econ. Manag., 2010.
[8]
L. P. Swiler, et al., "A Graph-Based Network-Vulnerability Analysis System", Sandia National Labs, 1998.
[9]
S. Jha, et al., "Two formal analyses of attack graphs", 15th IEEE Computer Security Foundations Workshop, 2002.
[10]
R. Dewri, et al., "Optimal security hardening on attack tree models of networks: a cost-benefit analysis", Int. J. Inf. Secur., 2012.
[11]
R. Dewri, et al., "Optimal Security Hardening Using Multi-objective Optimization on Attack Tree Models of Networks", ACM Conference on CCS, 2007.
[12]
K. J. S. Hoo, "How much is enough? A risk management approach to computer security". Stanford University, 2000.
[13]
Joost R. Santos, "Modeling the Demand Reduction Input-Output Inoperability Due to Terrorism of Interconnected Infrastructures", Wiley Online Library, 2004.
[14]
B. Karabacak, et al., "ISRAM: information security risk analysis method", Computers & Security, 2005.
[15]
K. Bernsmed, et al., "Security SLAs for Federated Cloud Services", 2011 ARES.
[16]
C. J. Alberts, et al. "Managing Information Security Risks: The Octave Approach". Addison-Wesley Longman, 2002.
[17]
M. S. Lund, et al., "Model-Driven Risk Analysis: The CORAS Approach".Science & Business Media, 2010.
[18]
F. Vraalsen, et al., "The CORAS Tool-Supported Methodology for UML-Based Security Analysis". SINTEFICT, 2004.
[19]
Z. Yazar, "A qualitative risk analysis and management tool-CRAMM", InfoSec Read. Room White Paper, 2002.
[20]
Cloud Security Alliance, "The Treacherous 12 Cloud Computing Top Threats in 2016". 2016.

Cited By

View all
  • (2023)Cloud Top Management Role in Reducing Mobile Broadband Transmission Hazards and Offering Safety2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE57410.2023.10182893(1064-1068)Online publication date: 12-May-2023
  • (2022)Role of Cloud Management in Mitigating Vulnerabilities in Wireless Data Exchange Providing Cybersecurity2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)10.1109/IIHC55949.2022.10060432(671-676)Online publication date: 18-Nov-2022
  • (2021)A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation StrategiesIEEE Access10.1109/ACCESS.2021.30732039(57792-57807)Online publication date: 2021

Index Terms

  1. An optimal investment scheme based on ATM considering cloud security environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication
    January 2017
    746 pages
    ISBN:9781450348881
    DOI:10.1145/3022227
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 January 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attack tree
    2. cloud security
    3. optimal investment

    Qualifiers

    • Research-article

    Conference

    IMCOM '17
    Sponsor:

    Acceptance Rates

    IMCOM '17 Paper Acceptance Rate 113 of 366 submissions, 31%;
    Overall Acceptance Rate 213 of 621 submissions, 34%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Cloud Top Management Role in Reducing Mobile Broadband Transmission Hazards and Offering Safety2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE57410.2023.10182893(1064-1068)Online publication date: 12-May-2023
    • (2022)Role of Cloud Management in Mitigating Vulnerabilities in Wireless Data Exchange Providing Cybersecurity2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)10.1109/IIHC55949.2022.10060432(671-676)Online publication date: 18-Nov-2022
    • (2021)A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation StrategiesIEEE Access10.1109/ACCESS.2021.30732039(57792-57807)Online publication date: 2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media