ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud

Armstrong Nhlabatsi, Alaa Hussein, Rachael Fernandez, Noora Fetais, Jin Hong, Dong Seong Kim, Khaled M. Khan

Research output: Chapter in Book/Conference paperConference paperpeer-review

2 Citations (Scopus)

Abstract

In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be effective in addressing specific threats for different clients. In this paper, we describe a tool, called 'ThreatRiskEvaluator' that assesses security risks that are specific and relevant to specific cloud clients. The tool implements a novel risk analysis mechanism that utilizes various security-related properties of the cloud such as vulnerability information, the probability of an attack, as well as client-specific security requirements. The method enables cloud providers to make fine-grained decisions for selecting specific protection mechanisms to tackle specific risks posed to individual clients based on their security needs against specific threats.

Original languageEnglish
Title of host publication2019 International Conference on Cyber Security for Emerging Technologies, CSET 2019
Place of PublicationUSA
PublisherIEEE, Institute of Electrical and Electronics Engineers
ISBN (Electronic)9781728145389
DOIs
Publication statusPublished - 1 Oct 2019
EventInternational Conference on Cyber Security for Emerging Technologies, CSET'19 - Doha, Qatar
Duration: 27 Oct 201929 Oct 2019
http://www.qu.edu.qa/conference/CSET-2019

Publication series

Name2019 International Conference on Cyber Security for Emerging Technologies, CSET 2019

Conference

ConferenceInternational Conference on Cyber Security for Emerging Technologies, CSET'19
Country/TerritoryQatar
CityDoha
Period27/10/1929/10/19
Internet address

Fingerprint

Dive into the research topics of 'ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud'. Together they form a unique fingerprint.

Cite this