A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection

Alexandros Chrysikos, Stephen McGuire

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.
LanguageEnglish
Title of host publicationGuide to Vulnerability Analysis for Computer Networks and Systems
Subtitle of host publicationAn Artificial Intelligence Approach
EditorsSimon Parkinson, Andrew Crampton, Richard Hill
PublisherSpringer International Publishing AG
Chapter4
Pages81-99
ISBN (Electronic)9783319926247
ISBN (Print)9783319926230
DOIs
Publication statusPublished - 8 Sep 2018

Publication series

NameComputer Communications and Networks
PublisherSpringer
ISSN (Print)1617-7975
ISSN (Electronic)2197-8433

Fingerprint

Taxonomies
Cloud computing
Risk assessment
Merging

Cite this

Chrysikos, A., & McGuire, S. (2018). A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. In S. Parkinson, A. Crampton, & R. Hill (Eds.), Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach (pp. 81-99). (Computer Communications and Networks). Springer International Publishing AG. https://doi.org/10.1007/978-3-319-92624-7_4
Chrysikos, Alexandros ; McGuire, Stephen. / A Predictive Model for Risk and Trust Assessment in Cloud Computing : Taxonomy and Analysis for Attack Pattern Detection. Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. editor / Simon Parkinson ; Andrew Crampton ; Richard Hill. Springer International Publishing AG, 2018. pp. 81-99 (Computer Communications and Networks).
@inbook{439d76b6112542009c87bc9a61c05f46,
title = "A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection",
abstract = "Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.",
author = "Alexandros Chrysikos and Stephen McGuire",
year = "2018",
month = "9",
day = "8",
doi = "10.1007/978-3-319-92624-7_4",
language = "English",
isbn = "9783319926230",
series = "Computer Communications and Networks",
publisher = "Springer International Publishing AG",
pages = "81--99",
editor = "Simon Parkinson and Andrew Crampton and Richard Hill",
booktitle = "Guide to Vulnerability Analysis for Computer Networks and Systems",
address = "Switzerland",

}

Chrysikos, A & McGuire, S 2018, A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. in S Parkinson, A Crampton & R Hill (eds), Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Computer Communications and Networks, Springer International Publishing AG, pp. 81-99. https://doi.org/10.1007/978-3-319-92624-7_4

A Predictive Model for Risk and Trust Assessment in Cloud Computing : Taxonomy and Analysis for Attack Pattern Detection. / Chrysikos, Alexandros; McGuire, Stephen.

Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. ed. / Simon Parkinson; Andrew Crampton; Richard Hill. Springer International Publishing AG, 2018. p. 81-99 (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - A Predictive Model for Risk and Trust Assessment in Cloud Computing

T2 - Taxonomy and Analysis for Attack Pattern Detection

AU - Chrysikos, Alexandros

AU - McGuire, Stephen

PY - 2018/9/8

Y1 - 2018/9/8

N2 - Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.

AB - Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.

U2 - 10.1007/978-3-319-92624-7_4

DO - 10.1007/978-3-319-92624-7_4

M3 - Chapter

SN - 9783319926230

T3 - Computer Communications and Networks

SP - 81

EP - 99

BT - Guide to Vulnerability Analysis for Computer Networks and Systems

A2 - Parkinson, Simon

A2 - Crampton, Andrew

A2 - Hill, Richard

PB - Springer International Publishing AG

ER -

Chrysikos A, McGuire S. A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. In Parkinson S, Crampton A, Hill R, editors, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Springer International Publishing AG. 2018. p. 81-99. (Computer Communications and Networks). https://doi.org/10.1007/978-3-319-92624-7_4