A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology

被引:0
|
作者
Hersyah, Mohammad Hafiz [1 ]
Hossain, Md Delwar [1 ]
Taenaka, Yuzo [1 ]
Kadobayashi, Youki [1 ]
机构
[1] Nara Inst Sci & Technol, Div Informat Sci, Nara, Japan
关键词
Risk Assessment; docker container; Cloud Computing; Infrastructure-as-a-Service; AHP;
D O I
10.1109/CIoT57267.2023.10084910
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The articulate utilization of docker container assets in Cloud Computing is one strategic pivotal aspect of the underlying rationale for customers to conjecture on their ventures. It can be standardized under the organization's viewpoints toward its purposes and objectives, given the facilities provided by a cloud service provider. IaaS (Infrastructure-as-a-Service) topology offers many opportunities, including serverless capability in a docker container through software abstraction, and magnifying customization. Techniques such as intensifying the quality of streamlined services, and uplifts productivity, become sufficient evidence of underlying equal responsibilities between provider and customer, which need to be evaluated its risks periodically to improve the resilience of containerized objects. This study contributes alternate insight concerning risk assessment methodology in a docker container environment to mitigate the risk rating and propose risk treatment recommendations for cloud providers and customers. To grasp unified security perception in analyzing assets, threats, and vulnerabilities, harnessing several methods and international standards such as the Analytical Hierarchy process, Partial Dependency, ISO 27K Family, MITRE ATT&CK, EBIOS Risk Manager, and NIST 800-30. The experiment uses a real-world threat group from MITRE ATT&CK called TeamTNT.
引用
收藏
页码:225 / 230
页数:6
相关论文
共 50 条
  • [41] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [42] A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong
    Macdonell, Stephen G.
    FUTURE INTERNET, 2024, 16 (08)
  • [43] Intrusion detection in cloud computing based attacks patterns and risk assessment
    Ben Charhi, Youssef
    Mannane, Nada
    Bendriss, Elmehdi
    Regragui, Boubker
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P92 - P95
  • [44] A New Shared and Comprehensive Tool of Cloud Computing Security Risk Assessment
    Drissi, Saadia
    Benhadou, Siham
    Medromi, Hicham
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 155 - 167
  • [45] ISA-based Model for Risk Assessment in Cloud Computing Environment
    Benfateh, Amal
    Gharnati, F.
    Agouti, T.
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, : 377 - 383
  • [46] Semantic Similarity Model for Risk Assessment in Forming Cloud Computing SLAs
    Hussain, Omar
    Dong, Hai
    Singh, Jaipal
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II, 2010, 6427 : 843 - 860
  • [47] Scalable risk assessment method for cloud computing using game theory (CCRAM)
    Furuncu, Evrim
    Sogukpinar, Ibrahim
    COMPUTER STANDARDS & INTERFACES, 2015, 38 : 44 - 50
  • [48] Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment
    Wang, Gaocai
    Yu, Ning
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [49] Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    JURNAL TEKNOLOGI, 2015, 73 (02):
  • [50] Implementation approach for IDS based on risk assessment and attack pattern in cloud computing
    Ben Charhi, Youssef
    Bendriss, Elmehdi
    Mannane, Nada
    Regragui, Boubker
    2018 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD), 2018,