Misuse patterns for cloud computing

Keiko Hashizume*, Eduardo B. Fernandez, Nobukazu Yoshioka

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Cloud Computing is a new computing architecture that allows providers to deliver services on demand by means of virtualization. This work presents misuse patterns that describe how some typical attacks are performed and indicates appropriate countermeasures. These misuse patterns provide insight on how to build secure clouds and are also useful to evaluate the security of existing cloud systems. Specifically, we present a pattern for Malicious Virtual Machine Creation and describe two other patterns we have written.

Original languageEnglish
Title of host publicationSEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering
Pages683-686
Number of pages4
Publication statusPublished - 2011
Externally publishedYes
EventSEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering - Miami, FL, United States
Duration: 2011 Jul 72011 Jul 9

Publication series

NameSEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering

Conference

ConferenceSEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering
Country/TerritoryUnited States
CityMiami, FL
Period11/7/711/7/9

Keywords

  • Cloud computing
  • Misuse patterns
  • Security patterns
  • Virtualization threats

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Misuse patterns for cloud computing'. Together they form a unique fingerprint.

Cite this