Lastly, the assumption (done by Cloud Security
Alliance) that each control associated to a threat has
the same mitigation degree is a threat to validity in
the sense that control effectiveness to mitigate a
threat can be different from one control to another.
However, as introduced above, although it is an
approximation, we decided to follow this assumption
to stick at the level of information provided in
current standards and avoid introducing our own
proposal, arguable by design.
6 CONCLUSIONS AND FUTURE
WORK
In this paper, we have evaluated our risk-based
approach for cloud offer selection using the portfolio
of offers of a Luxembourg cloud provider. The
results demonstrate the applicability of such an
approach and its adequacy to make clear the risk
coverage of offers.
Regarding future work, we want to evaluate also
the cloud consumer part of our approach. To do so,
it is necessary to develop a Cloud Consumer Model
(CCM) that will be supported by a Security
Requirements Engineering (SRE) approach. A
second aspect will be to develop a risk-based
decisional model to support the cloud consumer
during its offer selection. In this sense, Multiple
Criteria Decision Analysis (MCDA) (Belton and
Stewart, 2002) will be investigated.
REFERENCES
Alnemr, R., Pearson, S., Leenes, R., Mhungu, R., 2014.
Coat: Cloud Offerings Advisory Tool, in: 2014 IEEE
6th International Conference on Cloud Computing
Technology and Science (CloudCom), Singapore,
Singapore, 15 - 18 December, 2014.
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz,
R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin,
A., Zaharia, M., 2009. Above the Clouds: A Berkeley
View of Cloud Computing.
Belton, V., Stewart, T., 2002. Multiple Criteria Decision
Analysis: An Integrated Approach. Springer Science
& Business Media.
Brook, J.-M., Field, S., Shackleford, D., Hargrave, V.,
Jameson, L., Roza, M., 2016. The Treacherous 12: Cloud
Computing Top Threats in 2016. Cloud Security Alliance.
Cloud Security Alliance, 2014. Cloud Control Matrix
(CCM) v.3.0.1. Cloud Security Alliance.
Cloud Security Alliance, 2013. The Notorious Nine - Cloud
Computing Top Threats in 2013. Cloud Security Alliance.
European Network and Information Security Agency,
2009a. Cloud Computing Risk Assessment.
European Network and Information Security Agency,
2009b. Benefits, risks and recommendations for
information security. European Network and
Information Security Agency.
Gillam, L., Li, B., O’Loughlin, J., 2012. Adding Cloud
Performance to Service Level Agreements. Presented
at the 2nd International Conference on Cloud
Computing and Services Science, Porto, Portugal, 18 -
21 April, 2012.
Goettelmann, E., 2015. Risk-aware Business Process
Modelling and Trusted Deployment in the Cloud.
Université de Lorraine.
Goettelmann, E., Mayer, N., Godart, C., 2014. Integrating
Security Risk Management into Business Process
Management for the Cloud, in: IEEE 16th Conference
on Business Informatics, CBI 2014, Geneva,
Switzerland, July 14-17, 2014 - Volume 1.
Goettelmann, E., Mayer, N., Godart, C., 2013. A general
approach for a trusted deployment of a business
process in clouds, in: Fifth International Conference
on Management of Emergent Digital EcoSystems,
Luxembourg, Luxembourg, October 29-31, 2013.
Islam, S., Fenz, S., Weippl, E., Mouratidis, H., 2017. A
Risk Management Framework for Cloud Migration
Decision Support. Journal of Risk and Financial
Management 10, 10.
ISO/IEC, 2015. ISO/IEC 27017, Information tech.,
Security techniques, Code of practice for information
security controls for cloud computing services based
on ISO/IEC 27002.
ISO/IEC, 2011. ISO/IEC 27005, Information tech., Securi-
ty techniques, Information security risk management.
Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J.,
Teregowda, P., 2011. Decision Support Tools for Cloud
Migration in the Enterprise, in: 2011 IEEE International
Conference on Cloud Computing (CLOUD).
Kolevski, D., Michael, K., 2015. Cloud computing data
breaches a socio-technical review of literature, in:
2015 International Conference on Green Computing
and Internet of Things (ICGCIoT).
National Institute of Standards and Technology, 2011.
Special Publication 800-144: Guidelines on Security
and Privacy in Public Cloud Computing. National
Institute of Standards and Technology.
Stamou, K., Morin, J.-H., Gâteau, B., Aubert, J., 2012.
Service Level Agreements as a Service - Towards
Security Risks Aware SLA Management, in: 2nd
International Conference on Cloud Computing and
Services Science, Porto, Portugal, 18 - 21 April, 2012.
System Administration Networking and Security Institute,
2015. The CIS Critical Security Controls for Effective
Cyber Defense (No. Version 6.0). System
Administration Networking and Security Institute.
Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner,
M., 2008. A Break in the Clouds: Towards a Cloud
Definition. SIGCOMM Comput. Commun. Rev. 39.
Wenzel, S., Wessel, C., Humberg, T., Jürjens, J., 2012.
Securing Processes for Outsourcing into the Cloud, in:
2nd International Conference on Cloud Computing and
Services Science, Porto, Portugal, 18 - 21 April, 2012.
Winkler, V. (JR), 2011. Securing the Cloud: Cloud
computer Security techniques and tactics. Elsevier.