Design and Implementation of a Threat-Specific Security Risk Assessment Tool

2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)(2020)

引用 0|浏览22
暂无评分
摘要
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider client-specific security requirements. This results into unrealistic and inaccurate security risk evaluation. In this paper, we describe the detailed design and implementation of a security risk assessment tool. The tool supports a threat-specific method to security risk evaluation. The threat-specific method enables Cloud Providers to evaluate the security risk of their tenants based tenant-specific threats as dictated by their particular security requirements. Evaluation shows that the tool is highly usable, but lacks in scaleability.
更多
查看译文
关键词
Cloud computing,vulnerability,security risk,risk assessment,security threats,security objectives,domain model,use cases,class diagrams
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要