{"title":"A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing","authors":"D. Bird","doi":"10.1145/3264437.3264466","DOIUrl":null,"url":null,"abstract":"There are a number of methods of abstraction used in public cloud computing models today. Successive incidents involving cloud customer instantiations reveal that either the security risks are difficult to comprehend, or customers' requisite security responsibilities are not fully understood. A pretext to this paper is an argument that there has been an over-reliance upon: (a) compliance mapping by customers that can hide technical complexities and the associated technical risks, or (b) risk assessment methods that pre-date cloud. The transition to a Cloud 2.0 era offers us an opportunity to re-think architecture and also to re-calibrate security approaches in order to better understand the risks. A Conceptual Framework has been derived for this purpose and proposed as a mechanism to contextualise public cloud risks.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th International Conference on Security of Information and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3264437.3264466","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
There are a number of methods of abstraction used in public cloud computing models today. Successive incidents involving cloud customer instantiations reveal that either the security risks are difficult to comprehend, or customers' requisite security responsibilities are not fully understood. A pretext to this paper is an argument that there has been an over-reliance upon: (a) compliance mapping by customers that can hide technical complexities and the associated technical risks, or (b) risk assessment methods that pre-date cloud. The transition to a Cloud 2.0 era offers us an opportunity to re-think architecture and also to re-calibrate security approaches in order to better understand the risks. A Conceptual Framework has been derived for this purpose and proposed as a mechanism to contextualise public cloud risks.