TY - CHAP
T1 - A Predictive Model for Risk and Trust Assessment in Cloud Computing
T2 - Taxonomy and Analysis for Attack Pattern Detection
AU - Chrysikos, Alexandros
AU - McGuire, Stephen
PY - 2018/9/8
Y1 - 2018/9/8
N2 - Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.
AB - Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.
U2 - 10.1007/978-3-319-92624-7_4
DO - 10.1007/978-3-319-92624-7_4
M3 - Chapter
SN - 9783319926230
T3 - Computer Communications and Networks
SP - 81
EP - 99
BT - Guide to Vulnerability Analysis for Computer Networks and Systems
A2 - Parkinson, Simon
A2 - Crampton, Andrew
A2 - Hill, Richard
PB - Springer International Publishing AG
ER -