Defining the Cloud Battlefield Supporting Security Assessments by Cloud Customers

Download Now
Provided by: IBM
Topic: Cloud
Format: PDF
Cloud computing is becoming more and more popular, but security concerns over-shadowing its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divides insiders from outsiders, therefore making security assessments by cloud customers more difficult. In this paper, the authors propose a model that combines a comprehensive system model of infrastructure clouds with a security model that captures security requirements of cloud customers as well as characteristics of attackers.
Download Now

Find By Topic