Loading [a11y]/accessibility-menu.js
Model for IaaS Security Model: MISP Framework | IEEE Conference Publication | IEEE Xplore

Model for IaaS Security Model: MISP Framework


Abstract:

Cloud computing offers plenty of services having benefits of cost cutting, flexibility, availability, elasticity and pay per use for cloud users and centralized control, ...Show More

Abstract:

Cloud computing offers plenty of services having benefits of cost cutting, flexibility, availability, elasticity and pay per use for cloud users and centralized control, safety and management for Cloud Service Providers (CSP). Out of several service models, Infrastructure-as-a-Service (IaaS) preludes by offering access to computing resources like CPUs, servers, network devices through software like APIs, UIs and GUIs over the internet. Along with numerous merits of IaaS, there exist several security and privacy issues and threats to Confidentiality, Integrity and Authentication (CIA) triad. In this paper, we explore security and privacy issues related to IaaS components through rigorous study and determine counter measures for the same. Furthermore, with the help of MITRE ATT&CK knowledge base, a Model for IaaS Security and Privacy: MISP framework is proposed. The framework is exhibited as a multidimensional structure, each dimension having different parameters. This leads to addition of important features currently missing in the existing models. The proposed framework enhances security and privacy in IaaS model and guides for safer adoption of the delivery model by organizations and enterprises.
Date of Conference: 25-27 June 2021
Date Added to IEEE Xplore: 04 August 2021
ISBN Information:
Conference Location: Hubli, India

I. Introduction

Cloud computing has become a technology that enables organizations and enterprises to pay for the hardware and software resources that are housed in data centers of Cloud Service Provider (CSP) and services are delivered to the users via Internet [1]. It is defined as ubiquitous, flexible, efficient, elastic, convenient and on-demand network and operational access to a shared pool of configurable resources independent of locations and types of devices [2], [3]. The resources like networks, servers, storage disks, applications and services can be rapidly provisioned or released with minimum management efforts maintaining security and privacy requirements. Recently, plethora of challenges have widened their presence that drew considerable attention of academicians and researchers.

Contact IEEE to Subscribe

References

References is not available for this document.