A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology

被引:0
|
作者
Hersyah, Mohammad Hafiz [1 ]
Hossain, Md Delwar [1 ]
Taenaka, Yuzo [1 ]
Kadobayashi, Youki [1 ]
机构
[1] Nara Inst Sci & Technol, Div Informat Sci, Nara, Japan
关键词
Risk Assessment; docker container; Cloud Computing; Infrastructure-as-a-Service; AHP;
D O I
10.1109/CIoT57267.2023.10084910
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The articulate utilization of docker container assets in Cloud Computing is one strategic pivotal aspect of the underlying rationale for customers to conjecture on their ventures. It can be standardized under the organization's viewpoints toward its purposes and objectives, given the facilities provided by a cloud service provider. IaaS (Infrastructure-as-a-Service) topology offers many opportunities, including serverless capability in a docker container through software abstraction, and magnifying customization. Techniques such as intensifying the quality of streamlined services, and uplifts productivity, become sufficient evidence of underlying equal responsibilities between provider and customer, which need to be evaluated its risks periodically to improve the resilience of containerized objects. This study contributes alternate insight concerning risk assessment methodology in a docker container environment to mitigate the risk rating and propose risk treatment recommendations for cloud providers and customers. To grasp unified security perception in analyzing assets, threats, and vulnerabilities, harnessing several methods and international standards such as the Analytical Hierarchy process, Partial Dependency, ISO 27K Family, MITRE ATT&CK, EBIOS Risk Manager, and NIST 800-30. The experiment uses a real-world threat group from MITRE ATT&CK called TeamTNT.
引用
收藏
页码:225 / 230
页数:6
相关论文
共 50 条
  • [31] Modeling Cloud Computing Risk Assessment Using Ensemble Methods
    Ahmed, Nada
    Abraham, Ajith
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 261 - 274
  • [32] Risk Assessment for Emerging Domains (IoT, Cloud Computing, and AI)
    Al Attar, Rama
    Al-Nemri, Joyce
    Homsi, Ahmad
    Qusef, Abdallah
    2021 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2021, : 120 - 127
  • [33] Collaborative Global Impact Cloud Computing Risk Assessment Framework
    Watkins, Lanier
    Cho, Cheng-Hao
    Hurley, John
    Rubin, Aviel
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 424 - 428
  • [34] Risk Assessment and Classification of Focusing SLA Requirement in Cloud Computing
    Pang, Yasheng
    Song, YouJin
    Kang, JangMook
    Yun, Jae-Kwan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 243 - 255
  • [35] A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing
    Amini, Ahmad
    Jamil, Norziana
    1ST INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (ICOBIC) 2017, 2018, 1018
  • [36] A Study of Risk Evaluation Framework for Cloud Computing System
    Lin, Fan
    Xiahou, Jianbin
    Zeng, Wenhua
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1351 - 1366
  • [37] Study on privacy risk measurement model of cloud computing
    Ma Z.
    Jiang R.
    Li R.
    Li T.
    Yang J.
    Zhang Q.
    Jiang, Rong (jiang_rong@aliyun.com), 1600, Bentham Science Publishers (10): : 315 - 324
  • [38] Security Risk Assessment of Mobile Internet Under Cloud Computing Mode
    Chen, Luping
    Guo, Yongzhen
    Zhou, Feng
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 219 - 226
  • [39] The New Risk Assessment Model for Information System in Cloud Computing Environment
    Liu Peiyu
    Liu Dong
    CEIS 2011, 2011, 15
  • [40] ISA-based model for risk assessment in cloud computing environment
    Benfateh, Amal
    Gharnati, F.
    Agouti, T.
    International Conference on Multimedia Computing and Systems -Proceedings, 2017, 0 : 377 - 383