Three misuse patterns for cloud computing

Keiko Hashizume, Nobukazu Yoshioka, Eduardo B. Fernandez

Research output: Chapter in Book/Report/Conference proceedingChapter

22 Citations (Scopus)

Abstract

Cloud computing is a new computing model that allows providers to deliver services on demand by means of virtualization. One of the main concerns in cloud computing is security. In particular, the authors describe some attacks in the form of misuse patterns, where a misuse pattern describes how an attack is performed from the point of view of the attacker. Specially, they describe three misuse patterns: Resource Usage Monitoring Inference, Malicious Virtual Machine Creation, and Malicious Virtual Machine Migration Process.

Original languageEnglish
Title of host publicationSecurity Engineering for Cloud Computing
Subtitle of host publicationApproaches and Tools
PublisherIGI Global
Pages36-53
Number of pages18
ISBN (Print)9781466621251
DOIs
Publication statusPublished - 2012
Externally publishedYes

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Three misuse patterns for cloud computing'. Together they form a unique fingerprint.

Cite this