Home > Research > Publications & Outputs > Cloud Security Requirement Based Threat Analysis

Electronic data

  • Cloud_Security_Requirement_Based_Threat_Analysis

    Accepted author manuscript, 424 KB, PDF document

Links

Text available via DOI:

View graph of relations

Cloud Security Requirement Based Threat Analysis

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date23/03/2023
Host publication2023 International Conference on Computing, Networking and Communications, ICNC 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages506-510
Number of pages5
ISBN (electronic)9781665457194
<mark>Original language</mark>English
Event2023 International Conference on Computing, Networking and Communications, ICNC 2023 - Honolulu, United States
Duration: 20/02/202322/02/2023

Conference

Conference2023 International Conference on Computing, Networking and Communications, ICNC 2023
Country/TerritoryUnited States
CityHonolulu
Period20/02/2322/02/23

Publication series

Name2023 International Conference on Computing, Networking and Communications, ICNC 2023

Conference

Conference2023 International Conference on Computing, Networking and Communications, ICNC 2023
Country/TerritoryUnited States
CityHonolulu
Period20/02/2322/02/23

Abstract

Threat analysis (TA) is a process to identify, detect, and evaluate security vulnerabilities systematically. Specifically, the TA, which focuses on threats that can potentially violate the customer's data ownership requirements of security and performance, is named Requirement Based Threat Analysis (RBTA). Despite the importance of RBTA, the current manual RBTA process is both time intensive and makes no assurance of completeness of the analysis. Thus, we develop a systematic analytic technique that enumerates customers' requirements and then determines all possible direct/indirect dependencies across them to conduct a generalized threat analysis from their requirements. The approach is validated for its effectiveness on actual Cloud customer requirements and can be generalized to apply to other requirements.