An integrated state transition-Boolean logic model for security analysis in cloud computing

The hype over cloud computing cannot go unnoticed even as providers and users alike testify of the evident benefits. It also goes without saying that this approach to computing shares its own challenges the most echoed being security. Security concerns herein, birthed by the exposure of the cloud to different threats, continue to cast doubts on potential users and it's only befitting that such concerns are addressed. Users who entrust their data to the cloud want their data to be secured in the strongest terms possible. Once data leaves the user, the onus is on the cloud provider to provide the required security since data now lies within their perimeter of jurisdiction. But security requirements do change with time and this therefore calls for a continuous process of evaluating the security status of the cloud system. This paper proposes a model of analyzing the security status of the cloud system with regards confidentiality, integrity and availability. We employ state transitions of a conceptual finite state machine, Boolean algebra and logic to evaluate the various states of the system when a specified breach occurs. The scope of this paper is limited to user data on the cloud and not as it traverses the network between the user and the provider.

[1]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[2]  Fang-Yie Leu,et al.  A Security Threats Measurement Model for Reducing Cloud Computing Security Risk , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[3]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[4]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[5]  Moses Garuba,et al.  Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics , 2015, 2015 12th International Conference on Information Technology - New Generations.

[6]  Kevin Fiedler,et al.  Elements of the theory of Markov processes and their applications , 1960 .

[7]  M. Avram,et al.  Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .

[8]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[9]  Ke Chen,et al.  Model for cloud computing security assessment based on AHP and FCE , 2014, 2014 9th International Conference on Computer Science & Education.

[10]  Prashant Srivastava,et al.  An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[11]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[12]  Ludovic Piètre-Cambacédès,et al.  Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.

[13]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[14]  Liu Bao-xu Model for Cloud Computing Security Assessment Based on Classified Protection , 2013 .

[15]  Vijay Varadharajan,et al.  Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.

[16]  Khaled M. Khan,et al.  Trust in Cloud Services: Providing More Controls to Clients , 2013, Computer.

[17]  C. Cachin,et al.  A cloud you can trust , 2011, IEEE Spectrum.