Misuse patterns for cloud computing

Keiko Hashizume, Nobukazu Yoshioka, Eduardo B. Fernandez

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Cloud Computing is a new computing structure that allows providers to deliver services on demand by means of virtualization. We are studying some security attacks in cloud computing by describing them in the form of misuse patterns. A misuse pattern describes how an information misuse is performed from the point of view of the attacker. It defines the environment where the attack is performed, how the attack is performed, countermeasures to stop it, and how to find forensic information to trace the attack once it happens. We are building a catalog of misuse patterns and we present here two of them: Resource Usage Monitoring (complete) and Malicious Virtual Machine Creation (partially). We discuss also the value of having such a catalog.

Original languageEnglish
Title of host publicationAsianPLoP 2011 - 2nd Asian Conference on Pattern Languages of Programs, Proceedings
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450321099
DOIs
Publication statusPublished - 2011 Oct 5
Externally publishedYes
Event2nd Asian Conference on Pattern Languages of Programs, AsianPLoP 2011 - Tokyo, Japan
Duration: 2011 Oct 52011 Oct 7

Publication series

NameACM International Conference Proceeding Series
Volume2011-October

Other

Other2nd Asian Conference on Pattern Languages of Programs, AsianPLoP 2011
Country/TerritoryJapan
CityTokyo
Period11/10/511/10/7

Keywords

  • Cloud computing
  • Misuse patterns
  • Monitoring
  • Security
  • Virtual machine

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Misuse patterns for cloud computing'. Together they form a unique fingerprint.

Cite this