2018
DOI: 10.1007/978-3-030-01042-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Data Protection Vulnerabilities of Cloud Systems Using Risk Patterns

Abstract: Ensuring the protection of sensitive data is important for the adoption of cloud services. Cloud systems are becoming increasingly complex and dynamic, leading to various potential scenarios for attackers to get access to sensitive data. To handle such data protection risks, the concept of risk patterns was introduced previously. A risk pattern models a structural fragment of cloud systems that should not appear in the running system because it would lead to high data protection risks. At deployment and at run… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Second, it is typically specific to the system domain and underlying infrastructure. Research dealing with risk analysis, e.g., [20]- [23], as a design time activity is related to our work, i.e., it would be needed to identify and model Problematic Configuration Patterns (PCPs) and how to resolve them (see section IV for details on PCPs) as suggested by our approach. Our approach is agnostic to a specific risk analysis approach, therefore it could be seen as complimentary research.…”
Section: Related Workmentioning
confidence: 99%
“…Second, it is typically specific to the system domain and underlying infrastructure. Research dealing with risk analysis, e.g., [20]- [23], as a design time activity is related to our work, i.e., it would be needed to identify and model Problematic Configuration Patterns (PCPs) and how to resolve them (see section IV for details on PCPs) as suggested by our approach. Our approach is agnostic to a specific risk analysis approach, therefore it could be seen as complimentary research.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Alebrahim et al perform threat analysis based on a model including the physical and virtual entities of a cloud system, its providers and customers, as well as entities like legislators that are indirectly linked to the system [16]. Palm et al use patterns to capture problematic configurations in cloud system models at design time [38].…”
Section: Related Workmentioning
confidence: 99%
“…In our earlier work, we analyzed the data protection impact of vulnerabilities described in the cloud literature [38].…”
Section: B Relation To Existing Cloud Servicesmentioning
confidence: 99%