Cloud Security Requirement Based Threat Analysis

Taha, Ahmed and Lawall, Alexander and Suri, Neeraj (2023) Cloud Security Requirement Based Threat Analysis. In: 2023 International Conference on Computing, Networking and Communications, ICNC 2023. 2023 International Conference on Computing, Networking and Communications, ICNC 2023 . Institute of Electrical and Electronics Engineers Inc., USA, pp. 506-510. ISBN 9781665457194

Full text not available from this repository.

Abstract

Threat analysis (TA) is a process to identify, detect, and evaluate security vulnerabilities systematically. Specifically, the TA, which focuses on threats that can potentially violate the customer's data ownership requirements of security and performance, is named Requirement Based Threat Analysis (RBTA). Despite the importance of RBTA, the current manual RBTA process is both time intensive and makes no assurance of completeness of the analysis. Thus, we develop a systematic analytic technique that enumerates customers' requirements and then determines all possible direct/indirect dependencies across them to conduct a generalized threat analysis from their requirements. The approach is validated for its effectiveness on actual Cloud customer requirements and can be generalized to apply to other requirements.

Item Type:
Contribution in Book/Report/Proceedings
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/1800/1802
Subjects:
?? CLOUD SECURITYSERVICE'S DEPENDENCIESTHREAT ANALYSISARTIFICIAL INTELLIGENCECOMPUTER NETWORKS AND COMMUNICATIONSCOMPUTER SCIENCE APPLICATIONSCOMPUTER VISION AND PATTERN RECOGNITIONINFORMATION SYSTEMS AND MANAGEMENT ??
ID Code:
192948
Deposited By:
Deposited On:
24 May 2023 14:05
Refereed?:
Yes
Published?:
Published
Last Modified:
19 Oct 2023 14:40