Visible to the public A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems

TitleA Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Publication TypeConference Paper
Year of Publication2018
AuthorsTorkura, K. A., Sukmana, M. I. H., Meinig, M., Cheng, F., Meinel, C., Graupner, H.
Conference NameNOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
ISBN Number978-1-5386-3416-5
Keywordsattack tree, cloud computing, Cloud Security, cloud stakeholders, Cloud storage brokerage systems, Cloud Storage Brokers, cloud storage complexities, Cloud storage Enumeration Attack, Cloud Storage Exploitation Attack, cloud storage systems, Cloud-Security, Common Configuration Scoring System, composability, comprehensive risk assessments, Computational modeling, conflicting security policies, Data models, file sharing systems, Human Behavior, human factors, identified security risks, Mathematical model, Measurement, Metrics, Peer-to-peer computing, pubcrawl, resilience, Resiliency, risk management, Secure Configuration, Secure File Sharing, security, security challenges, security metrics, security of data, security risk assessment, storage management, threat modeling, threat modeling schema, threat models, Tools, trees (mathematics)

Cloud storage brokerage systems abstract cloud storage complexities by mediating technical and business relationships between cloud stakeholders, while providing value-added services. This however raises security challenges pertaining to the integration of disparate components with sometimes conflicting security policies and architectural complexities. Assessing the security risks of these challenges is therefore important for Cloud Storage Brokers (CSBs). In this paper, we present a threat modeling schema to analyze and identify threats and risks in cloud brokerage brokerage systems. Our threat modeling schema works by generating attack trees, attack graphs, and data flow diagrams that represent the interconnections between identified security risks. Our proof-of-concept implementation employs the Common Configuration Scoring System (CCSS) to support the threat modeling schema, since current schemes lack sufficient security metrics which are imperatives for comprehensive risk assessments. We demonstrate the efficiency of our proposal by devising CCSS base scores for two attacks commonly launched against cloud storage systems: Cloud sStorage Enumeration Attack and Cloud Storage Exploitation Attack. These metrics are then combined with CVSS based metrics to assign probabilities in an Attack Tree. Thus, we show the possibility combining CVSS and CCSS for comprehensive threat modeling, and also show that our schemas can be used to improve cloud security.

Citation Keytorkura_threat_2018