A Generalized Threat Taxonomy for Cloud Computing

This paper presents a genre-based, generalized threat taxonomy for cloud computing. Cloud computing provides numerous possibilities and challenges but the nature of cloud computing exposes the resources of a cloud architecture to a wide range of threats. Presently, many potential threats, represente...

Full description

Bibliographic Details
Main Authors: Ahmed, Monjur (Author), Litchfield, Alan T (Author), Ahmed, Shakil (Author)
Format: Others
Published: ACIS, 2014-12-04T01:20:15Z.
Subjects:
Online Access:Get fulltext
LEADER 01613 am a22001813u 4500
001 8127
042 |a dc 
100 1 0 |a Ahmed, Monjur  |e author 
700 1 0 |a Litchfield, Alan T  |e author 
700 1 0 |a Ahmed, Shakil  |e author 
245 0 0 |a A Generalized Threat Taxonomy for Cloud Computing 
260 |b ACIS,   |c 2014-12-04T01:20:15Z. 
500 |a Proceedings of the 25th Australasian Conference on Information Systems, 8th - 10th December, Auckland, New Zealand 
500 |a 978-1-927184-26-4 
520 |a This paper presents a genre-based, generalized threat taxonomy for cloud computing. Cloud computing provides numerous possibilities and challenges but the nature of cloud computing exposes the resources of a cloud architecture to a wide range of threats. Presently, many potential threats, represented as security concerns, are known in a general sense but they are not classified specifically in relation to cloud services delivery. Therefore security concerns need identification and assessment and presented in a consistent and hierarchical form. We posit that to approach the issue in this way allows for more effective enforcement and therefore better resilience in a cloud architecture. We further posit that failure to effectively identify threats will lead to lower levels of trust, effectiveness and performance. The generalized threat taxonomy provides researchers with a framework through which risk factors and threats may be identified; and related against an overall picture of threat patterns. 
540 |a OpenAccess 
655 7 |a Conference Contribution 
856 |z Get fulltext  |u http://hdl.handle.net/10292/8127