• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于数据驱动的威胁分析,确保云环境系统的安全。

Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems.

机构信息

School of Architecture Computing and Engineering, University of East London, London E16 2RD, UK.

School of Computing and Information Science, Anglia Ruskin University, Cambridge CB1 1PT, UK.

出版信息

Sensors (Basel). 2022 Jul 30;22(15):5726. doi: 10.3390/s22155726.

DOI:10.3390/s22155726
PMID:35957281
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9371141/
Abstract

Cloud computing offers many benefits including business flexibility, scalability and cost savings but despite these benefits, there exist threats that require adequate attention for secure service delivery. Threats in a cloud-based system need to be considered from a holistic perspective that accounts for data, application, infrastructure and service, which can pose potential risks. Data certainly plays a critical role within the whole ecosystem and organisations should take account of and protect data from any potential threats. Due to the variation of data types, status, and location, understanding the potential security concerns in cloud-based infrastructures is more complex than in a traditional system. The existing threat modeling approaches lack the ability to analyse and prioritise data-related threats. The main contribution of the paper is a novel data-driven threat analysis (d-TM) approach for the cloud-based systems. The main motivation of d-TM is the integration of data from three levels of abstractions, i.e., management, control, and business and three phases, i.e., storage, process and transmittance, within each level. The d-TM provides a systematic flow of attack surface analysis from the user agent to the cloud service provider based on the threat layers in cloud computing. Finally, a cloud-based use case scenario was used to demonstrate the applicability of the proposed approach. The result shows that d-TM revealed four critical threats out of the seven threats based on the identified assets. The threats targeted management and business data in general, while targeting data in process and transit more specifically.

摘要

云计算提供了许多好处,包括业务灵活性、可扩展性和成本节约,但尽管有这些好处,仍存在需要引起足够重视的安全服务交付威胁。需要从整体角度考虑基于云的系统中的威胁,包括数据、应用程序、基础架构和服务,这些都可能带来潜在风险。数据在整个生态系统中当然起着至关重要的作用,组织应该考虑并保护数据免受任何潜在威胁。由于数据类型、状态和位置的变化,理解基于云的基础架构中的潜在安全问题比在传统系统中更加复杂。现有的威胁建模方法缺乏分析和优先处理与数据相关的威胁的能力。本文的主要贡献是一种新的数据驱动的威胁分析(d-TM)方法,用于基于云的系统。d-TM 的主要动机是整合来自三个抽象级别(即管理、控制和业务)和三个阶段(即存储、处理和传输)的数据,每个级别内都有数据。d-TM 基于云计算中的威胁层,从用户代理到云服务提供商提供了一种系统的攻击面分析流程。最后,使用基于云的用例场景来演示所提出方法的适用性。结果表明,d-TM 从识别的资产中发现了七个威胁中的四个关键威胁。这些威胁主要针对管理和业务数据,更具体地说是针对处理和传输中的数据。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/3144fd76d567/sensors-22-05726-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/adc25c49a297/sensors-22-05726-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/7f4857a9ab3d/sensors-22-05726-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/30310a147af4/sensors-22-05726-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/3144fd76d567/sensors-22-05726-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/adc25c49a297/sensors-22-05726-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/7f4857a9ab3d/sensors-22-05726-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/30310a147af4/sensors-22-05726-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1d1/9371141/3144fd76d567/sensors-22-05726-g004.jpg

相似文献

1
Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems.基于数据驱动的威胁分析,确保云环境系统的安全。
Sensors (Basel). 2022 Jul 30;22(15):5726. doi: 10.3390/s22155726.
2
A New Secure Model for Data Protection over Cloud Computing.云计算中数据保护的新型安全模型。
Comput Intell Neurosci. 2021 Nov 24;2021:8113253. doi: 10.1155/2021/8113253. eCollection 2021.
3
A Survey of Security in Cloud, Edge, and Fog Computing.云、边缘和雾计算中的安全问题研究综述。
Sensors (Basel). 2022 Jan 25;22(3):927. doi: 10.3390/s22030927.
4
eHealth Cloud Security Challenges: A Survey.电子健康云安全挑战:调查
J Healthc Eng. 2019 Sep 3;2019:7516035. doi: 10.1155/2019/7516035. eCollection 2019.
5
Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain.基于区块链的云辅助电子健康记录系统安全协议设计。
Sensors (Basel). 2020 May 21;20(10):2913. doi: 10.3390/s20102913.
6
The Current Status and Promotional Strategies for Cloud Migration of Hospital Information Systems in China: Strengths, Weaknesses, Opportunities, and Threats Analysis.中国医院信息系统云迁移的现状与推广策略:优势、劣势、机会与威胁分析
JMIR Med Inform. 2024 Feb 5;12:e52080. doi: 10.2196/52080.
7
An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN.基于ISM-ANN 的缓解可持续云计算挑战的实证研究。
PLoS One. 2024 Sep 30;19(9):e0308971. doi: 10.1371/journal.pone.0308971. eCollection 2024.
8
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis.数字安全漏洞与威胁对部署数字技术平台和应用的金融机构的影响:失效模式与效应分析及模糊理想解排序法分析
PeerJ Comput Sci. 2021 Aug 3;7:e658. doi: 10.7717/peerj-cs.658. eCollection 2021.
9
Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review.优先考虑影响云 ERP 采用的组织因素,以及与安全性、可用性和供应商相关的关键问题:系统文献回顾。
Sensors (Basel). 2021 Dec 15;21(24):8391. doi: 10.3390/s21248391.
10
Analysis of the security and privacy requirements of cloud-based electronic health records systems.基于云的电子健康记录系统的安全性和隐私性要求分析
J Med Internet Res. 2013 Aug 21;15(8):e186. doi: 10.2196/jmir.2494.

引用本文的文献

1
From Data Integration to Precision Medicine: A Value-Based Healthcare Approach for Sarcoma Care.从数据整合到精准医学:一种基于价值的肉瘤护理医疗方法。
J Clin Med. 2024 Oct 30;13(21):6500. doi: 10.3390/jcm13216500.
2
Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience.采用深度学习模型来管理 API 调用中的威胁,同时履行透明度义务,以实现全面的弹性。
Sensors (Basel). 2024 Jul 26;24(15):4859. doi: 10.3390/s24154859.