{"title":"Security in the cloud based systems: Structure and breaches","authors":"Vivek Shandilya, S. Shiva","doi":"10.1109/ICITST.2013.6750260","DOIUrl":null,"url":null,"abstract":"Cloud based systems(CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many components of the CBS, needs to be secured too. There have been initial attempts to model the security of the cloud in terms of securing stakeholder's computational space. Some recent attempts formally model the CBS as modularized actor models, using rewriting & equational logic based modeling languages. Building on these works we present a framework for building executable models of CBSs for security analyses. We illustrate its validity showing how the recent security breaches and security solutions can be modeled and analyzed using this framework.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750260","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Cloud based systems(CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many components of the CBS, needs to be secured too. There have been initial attempts to model the security of the cloud in terms of securing stakeholder's computational space. Some recent attempts formally model the CBS as modularized actor models, using rewriting & equational logic based modeling languages. Building on these works we present a framework for building executable models of CBSs for security analyses. We illustrate its validity showing how the recent security breaches and security solutions can be modeled and analyzed using this framework.