Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach
Abstract
:1. Introduction
1.1. Cloud Computing Landscape
1.2. The Stakeholder Conundrum
1.3. Motivation and Scope
- Development of new classifications and updated considerations, along with tailored S&P features designed to accommodate specific service models, deployment models, and stakeholder roles.
- Refinement of the framework to differentiate S&P attribute considerations based on stakeholder type, recognizing that attributes like authentication and identity management have distinct requirements for SaaS users versus PaaS or IaaS developers.
- Implementation of a prototype that provides a granular assessment of the degree of protection offered by the cloud consumption scenario, considering attribute functionality (threat detection, prevention, response) and the protected security domains (client, interface, network, virtualization, governance, compliance, legal, data). The prototype also shows the degree of deterrence the S&P attributes have.
2. Related Work
- Generalizability: Current research predominantly focuses on specific aspects of cloud security, such as individual deployment models, service models, cloud components (e.g., hypervisors, networking), or particular cloud applications (e.g., multimedia, storage services). This specificity limits the broader applicability of findings across the diverse landscape of cloud computing.
- Comprehensiveness and Consistency: Many studies concentrate on a limited set of S&P attributes, often neglecting the comprehensive spectrum of security needs. Additionally, the reliance on outdated security standards, like ISO 27001:2022 [39] or the Common Vulnerability Scoring System (CVSS), for evaluating cloud services does not fully accommodate the unique challenges presented by cloud computing. The inconsistency in prioritizing S&P qualities, with an over-reliance on performance metrics or user feedback, further complicates a holistic assessment.
- Extensibility and Expandability: A significant gap in current methodologies is their lack of adaptability to emerging technologies or evolving S&P issues. The rigidity of existing frameworks hinders their ability to incorporate new developments or phase out obsolete practices.
3. Catalog-Based Cloud Security Recommender and Assessment
3.1. Scenario-Based Cloud Security from a Stakeholders’ Perspective
- Default Attributes: Built-in S&P features, such as access control and authentication, safeguard cloud services by default. These provide basic protection without requiring additional user configuration.
- Non-default Attributes: Optional, enhanced S&P features available upon request, often at an additional cost. Examples include advanced encryption, backup services, or increased restoration bandwidth, which offer superior security measures beyond the standard provisions.
3.2. Mathematical Definition of the Model
4. CSSR Architecture and Implementation
4.1. CSSR Architecture
4.2. Scenario Information Extraction
5. CSC Architecture and Implementation
- Tangibility: shows the attribute’s tangible nature. Tangible attributes are composed of an algorithm, instrument, etc., measured in terms of use and cost (e.g., backup, encryption, etc.). Intangible ones deal with organizational and behavioral measures (e.g., insider trust).
- Service Model: shows the attribute’s applicability to a cloud service model (i.e., SaaS, PaaS, or IaaS attributes).
- Functionality: shows the attribute’s functionality as detection (D), prevention (P), and incident response (IR).
- Protectability: shows the type of S&P issue(s) from which an attribute can protect the cloud service. Protectability classes are client, interface, network, virtualization, governance, compliance, legal aspects, and data S&P issues. Refer to [8] for examples of S&P issues and types.
- Default: by default, cloud services have monitors for service health. However, consumers can purchase advanced monitors at their own expense. This classification shows whether an attribute is included by default.
Scenario (IaaS, System Admin, Public) | ||||||||
---|---|---|---|---|---|---|---|---|
Attribute | CSP1 Scores | CSP2 Scores | SAS1CSP1 | SAS1CSP2 | SAS2CSP1 | SAS2CSP2 | ||
(1) Encryption | 0.042 | 0.04 | 5.00 | 4.00 | 0.200 | 0.160 | 0.210 | 0.168 |
(2) Backup | 0.050 | 0.04 | 5.83 | 4.17 | 0.233 | 0.167 | 0.292 | 0.209 |
(3) Authentication and Identity Management | 0.042 | 0.04 | 4.28 | 5.71 | 0.171 | 0.228 | 0.180 | 0.240 |
(4) Dedicated Hardware | 0.033 | 0.04 | 4.00 | 2.00 | 0.160 | 0.080 | 0.132 | 0.066 |
(5) Data Isolation | 0.033 | 0.04 | 4.00 | 6.00 | 0.160 | 0.240 | 0.132 | 0.198 |
(6) Disaster Recovery | 0.050 | 0.04 | 6.25 | 5.00 | 0.250 | 0.200 | 0.313 | 0.250 |
(7) Hypervisor Security | 0.033 | 0.04 | 6.92 | 4.61 | 0.277 | 0.184 | 0.228 | 0.152 |
(8) Client-Side Protection | 0.042 | 0.04 | 7.14 | 5.71 | 0.286 | 0.228 | 0.300 | 0.240 |
(9) Service Monitoring | 0.042 | 0.04 | 6.25 | 8.75 | 0.250 | 0.350 | 0.263 | 0.368 |
(10) Access Control and Customizable Security Profiles | 0.042 | 0.04 | 5.83 | 4.16 | 0.233 | 0.166 | 0.245 | 0.175 |
(11) Secure Data Center Location | 0.033 | 0.04 | 5.71 | 8.57 | 0.228 | 0.343 | 0.188 | 0.283 |
(12) Standards and Certifications | 0.042 | 0.04 | 10.00 | 8.89 | 0.400 | 0.356 | 0.420 | 0.373 |
(13) Data Sanitization | 0.033 | 0.04 | 7.14 | 4.29 | 0.286 | 0.172 | 0.236 | 0.142 |
(14) SLA Guarantee and Conformity | 0.042 | 0.04 | 4.00 | 3.33 | 0.160 | 0.133 | 0.168 | 0.140 |
(15) Secure Scalability | 0.033 | 0.04 | 4.00 | 4.00 | 0.160 | 0.160 | 0.132 | 0.132 |
(16) Secure Service Composition | 0.033 | 0.04 | 5.00 | 5.00 | 0.200 | 0.200 | 0.165 | 0.165 |
(17) Software and Hardware Procurement | 0.033 | 0.04 | 3.33 | 5.00 | 0.133 | 0.200 | 0.110 | 0.165 |
(18) Insider Trust | 0.033 | 0.04 | 3.75 | 3.12 | 0.150 | 0.125 | 0.124 | 0.103 |
(19) Technology Change | 0.042 | 0.04 | 6.00 | 6.00 | 0.240 | 0.240 | 0.252 | 0.252 |
(20) Service Self-healing | 0.042 | 0.04 | 6.00 | 6.00 | 0.240 | 0.240 | 0.252 | 0.252 |
(21) Service Availability | 0.042 | 0.04 | 8.18 | 6.36 | 0.327 | 0.254 | 0.344 | 0.267 |
(22) Risk Management | 0.042 | 0.04 | 6.00 | 3.00 | 0.240 | 0.120 | 0.252 | 0.126 |
(23) Security Awareness | 0.042 | 0.04 | 8.88 | 5.55 | 0.355 | 0.222 | 0.373 | 0.233 |
(24) Secure Networking | 0.042 | 0.04 | 8.75 | 8.50 | 0.350 | 0.340 | 0.368 | 0.357 |
(25) Security Insurance | 0.050 | 0.04 | 3.33 | 3.33 | 0.133 | 0.133 | 0.167 | 0.167 |
Average | 5.8228 | 5.242 | 5.843 | 5.221 |
Empirical Evaluation of CSC
6. CSSA Architecture and Implementation
Empirical Evaluation of CSSA
7. Analytical Evaluation of the Framework
7.1. Validation of CSSR Completeness and Coverage
7.2. CSSR Correctness Validation
- A specific cloud consumption scenario;
- A list of potential S&P risks relevant to their scenario;
- And a list of 25 S&P attributes used by CSSR, along with detailed descriptions of each attribute.
7.3. Weyuker Properties Analysis for CSC and CSSA Evaluation
- Language Property A: In any given scenario involving a service model, deployment model, and a stakeholder, non-zero coefficients will be assigned to the same attribute within a predefined set across all service configurations.
- Language Property B: The size of the recommended attribute set for a compound service will be at least equal to the total size of the attribute sets recommended for each component service.
- Property 1: Different configurations for satisfying a scenario will result in varying assessment values.
- Property 2: An assessment score corresponds to a subset of configurations with values equal to or exceeding that score.
- Property 3: Two scenario configurations may have the same assessment value.
- Property 4: Even if two scenario configurations share the same attributes, their assessment values do not necessarily need to be identical.
- Property 5: The attribute set of the compound service configuration is greater than or equal to the combined attribute sets of its component configurations.
- Property 6: The assessment value of the compound scenario configuration cannot exceed the highest assessment value among its component configurations.
- Property 7: Assessment values for a configuration will change if attribute priorities (e.g., usability, security, or both) are weighted differently.
- Property 8: The assessment value will remain consistent for the same scenario configuration with identical priorities.
- Property 9: In compound services where a scenario configuration spans multiple CSPs, one must consider an additional attribute for network security between CSPs, resulting in one more parameter in the assessment value.
- (1)
- Language Property A Proof:
- (2)
- Language Property B: (Additive Property)
- (3)
- Property 1 Proof:
- (4)
- Property 2 Proof:
- (5)
- Property 3 Proof:
- (6)
- Property 4 Proof:
- (7)
- Property 5 Proof:
- (8)
- Property 6 Proof:
- (9)
- Property 7 Proof:
- (10)
- Property 8 Proof:
- (11)
- Property 9 Proof:
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hussein, A.E.A. Pragmatic Framework for Cloud Security Assessment: A Stakeholder-Oriented and Taxonomical Approach. Ph.D. Thesis, University of Memphis, Memphis, TN, USA, 2017. [Google Scholar]
- Biggest Data Breaches in US History (Updated 2025)|UpGuard. Available online: https://www.upguard.com/blog/biggest-data-breaches-us (accessed on 26 January 2025).
- Dyn Analysis Summary of Friday October 21 Attack|Dyn Blog. Available online: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ (accessed on 26 January 2025).
- Arkin, B. Important Customer Security Announcement. Available online: https://blog.adobe.com/en/publish/2013/10/03/important-customer-security-announcement (accessed on 26 January 2025).
- Salcedo, H. Google Drive, Dropbox, Box and iCloud Reach the Top 5 Cloud Storage Security Breaches List. Available online: https://web.archive.org/web/20160304081904/https://psg.hitachi-solutions.com/credeon/blog/google-drive-dropbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list (accessed on 26 January 2025).
- Yasani, R. Massive Cyber Attack on AWS Cloud Environment with 230 Million Unique Targets. Available online: https://cybersecuritynews.com/massive-aws-cyber-attack-230-million-environments/ (accessed on 23 February 2025).
- Ex-Amazon Employee Convicted Over Data Breach of 100 Million CapitalOne Customers|TechCrunch. Available online: https://techcrunch.com/2022/06/21/amazon-paige-thompson-capitalone-breach/ (accessed on 23 February 2025).
- NIST|National Institute of Standards and Technology. Available online: https://www.nist.gov/national-institute-standards-and-technology (accessed on 26 January 2025).
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011.
- Badger, L.; Bernstein, D.; Bohn, R.; Vaulx, F.D.; Hogan, M.; Mao, J.; Messina, J.; Mills, K.; Sokol, A.; Tong, J.; et al. High-Priority Requirements to Further USG Agency Cloud Computing Adoption; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011.
- Jansen, W.; Grance, T. Sp 800-144: Guidelines on Security and Privacy in Public Cloud Computing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011.
- Wang, S.; Zheng, Z.; Sun, Q.; Zou, H.; Yang, F. Cloud model for service selection. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, 10–15 April 2011; pp. 666–671. [Google Scholar]
- Top Threats to Cloud Computing 2024|CSA. Available online: https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-2024 (accessed on 23 February 2025).
- Lord Kelvin Quotations. Available online: http://zapatopi.net/kelvin/quotes/ (accessed on 26 January 2025).
- Encryption Can Make Cloud Computing Safer. Available online: https://www.usatoday.com/story/cybertruth/2013/05/31/cloud-security-hacking-encryption/2375689/ (accessed on 26 January 2025).
- Basu, S. 68 Cloud Security Statistics to Be Aware of in 2025. Available online: https://www.getastra.com/blog/security-audit/cloud-security-statistics/ (accessed on 23 February 2025).
- 2023 Cloud Security Report Shows Many Data Breaches—Press Release. Available online: https://cpl.thalesgroup.com/about-us/newsroom/2023-cloud-security-cyberattacks-data-breaches-press-release (accessed on 23 February 2025).
- 7 February 2024 The State of Cloud Data Security in 2023. Available online: https://www.paloaltonetworks.com/resources/research/data-security-2023-report (accessed on 23 February 2025).
- Cloud Security Alliance Survey Finds 77% of Respondents Feel. Available online: https://cloudsecurityalliance.org/press-releases/2024/02/14/cloud-security-alliance-survey-finds-77-of-respondents-feel-unprepared-to-deal-with-security-threats (accessed on 23 February 2025).
- Abuhussein, A.; Shiva, S.; Sheldon, F.T. CSSR: Cloud Services Security Recommender. In Proceedings of the 2016 IEEE World Congress on Services (SERVICES), San Francisco, CA, USA, 27 June–2 July 2016; pp. 48–55. [Google Scholar]
- Jouini, M.; Aissa, A.B.; Rabai, L.B.A.; Mili, A. Towards quantitative measures of Information Security: A Cloud Computing case study. Int. J. Cyber-Secur. Digit. Forensics IJCSDF 2012, 1, 248–262. [Google Scholar]
- Definition of METRIC. Available online: https://www.merriam-webster.com/dictionary/metric (accessed on 23 May 2017).
- Jaquith, A. Security Metrics: Replacing Fear, Uncertainty, and Doubt; Addison-Wesley: Upper Saddle River, NJ, USA, 2007; ISBN 978-0-321-34998-9. [Google Scholar]
- Radack, S. Security metrics: Measurements to support the continued development of information security technology. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, White Paper 2010. Available online: https://csrc.nist.gov/files/pubs/shared/itlb/itlbul2010-01.pdf (accessed on 23 February 2025).
- Wong, C. Security Metrics, a Beginner’s Guide, 1st ed.; McGraw-Hill Education: New York, NY, USA, 2011; ISBN 978-0-07-174400-3. [Google Scholar]
- Pauley, W. Cloud Provider Transparency: An Empirical Evaluation. IEEE Secur. Priv. 2010, 8, 32–39. [Google Scholar] [CrossRef]
- Ristov, S.; Gusev, M.; Kostoska, M. A new methodology for security evaluation in cloud computing. In Proceedings of the 2012 35th International Convention MIPRO, Opatija, Croatia, 21–25 May 2012; pp. 1484–1489. [Google Scholar]
- TPC-Homepage V5. Available online: http://www.tpc.org/ (accessed on 24 May 2017).
- Kossmann, D.; Kraska, T.; Loesing, S. An Evaluation of Alternative Architectures for Transaction Processing in the Cloud. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, Indianapolis, IN, USA, 6–11 June 2010; ACM: New York, NY, USA, 2010; pp. 579–590. [Google Scholar]
- Barker, S.K.; Shenoy, P. Empirical Evaluation of Latency-sensitive Application Performance in the Cloud. In Proceedings of the First Annual ACM SIGMM Conference on Multimedia Systems, Phoenix, AZ, USA, 22–23 February 2010; ACM: New York, NY, USA, 2010; pp. 35–46. [Google Scholar]
- Zeng, W.; Zhao, Y.; Zeng, J. Cloud Service and Service Selection Algorithm Research. In Proceedings of the First ACM/SIGEVO Summit on Genetic and Evolutionary Computation, Shanghai, China, 12–14 June 2009; ACM: New York, NY, USA, 2009; pp. 1045–1048. [Google Scholar]
- Rehman, Z.U.; Hussain, F.K.; Hussain, O.K. Towards Multi-criteria Cloud Service Selection. In Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Seoul, Republic of Korea, 30 June–2 July 2011; pp. 44–48. [Google Scholar]
- Han, S.-M.; Hassan, M.M.; Yoon, C.-W.; Huh, E.-N. Efficient Service Recommendation System for Cloud Computing Market. In Proceedings of the 2Nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Republic of Korea, 24–26 November 2009; ACM: New York, NY, USA, 2009; pp. 839–845. [Google Scholar]
- Ruiz-Alvarez, A.; Humphrey, M. An Automated Approach to Cloud Storage Service Selection. In Proceedings of the 2Nd International Workshop on Scientific Cloud Computing, San Jose, CA, USA, 8 June 2011; ACM: New York, NY, USA, 2011; pp. 39–48. [Google Scholar]
- WS-DREAM: Towards Open Datasets and Source Code for Web Service Research. Available online: http://wsdream.github.io/ (accessed on 24 May 2017).
- Alnemr, R.; Pearson, S.; Leenes, R.; Mhungu, R. COAT: Cloud Offerings Advisory Tool. In Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15–18 December 2014; pp. 95–100. [Google Scholar]
- Lei, C.; Dai, H.; Yu, Z.; Li, R. A service recommendation algorithm with the transfer learning based matrix factorization to improve cloud security. Inf. Sci. 2020, 513, 98–111. [Google Scholar] [CrossRef]
- Modic, J.; Trapero, R.; Taha, A.; Luna, J.; Stopar, M.; Suri, N. Novel efficient techniques for real-time cloud security assessment. Comput. Secur. 2016, 62, 1–18. [Google Scholar] [CrossRef]
- ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. International Organization for Standardization: Geneva, Switzerland, 2022.
- Automated Security and Compliance. Available online: https://www.cloudpassage.com/ (accessed on 6 June 2017).
- Your Business is in the Clouds. Protect what Matters with CipherCloud. Available online: https://cpl.thalesgroup.com/partners/ciphercloud (accessed on 2 April 2025).
- CASB and Cloud Cybersecurity Solutions|Cisco Cloudlock. Available online: https://www.cisco.com/site/us/en/products/security/cloudlock/index.html (accessed on 2 April 2025).
- Cloud Controls Matrix: Cloud Security Alliance. Available online: https://cloudsecurityalliance.org/group/cloud-controls-matrix/ (accessed on 26 January 2025).
- Dan Morrill, “CloudPassage Cloud Security Survey. Available online: https://web.archive.org/web/20220804124303/https://www.cloudave.com/25217/cloudpassage-cloud-security-survey/ (accessed on 26 January 2025).
- Bauer, D.S.; Koblentz, M.E. NIDX-an expert system for real-time network intrusion detection. In Proceedings of the [1988] Proceedings. Computer Networking Symposium, Washington, DC, USA; 1988; pp. 98–106. [Google Scholar]
- Jackson, K.; DuBois, D.; Stallings, C. An Expert System Application for Network Intrusion Detection. In Proceedings of the National Computer Security Conference, Washington, DC, USA, 1–4 October 1991. [Google Scholar]
- Gruschka, N.; Jensen, M. Attack Surfaces: A Taxonomy for Attacks on Cloud Services. In Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, 5–10 July 2010; pp. 276–279. [Google Scholar]
- Simmons, C.; Ellis, C.; Shiva, S.; Dasgupta, D.; Wu, Q. AVOIDIT: A Cyber Attack Taxonomy; Technical Report; University of Memphis: Albany, NY, USA, 2014. [Google Scholar]
- Cloud Security Alliance Releases Top Threats to Cloud. Available online: https://cloudsecurityalliance.org/press-releases/2024/08/06/cloud-security-alliance-releases-top-threats-to-cloud-computing-2024-report (accessed on 23 December 2024).
- Joint Task Force Transformation Initiative. SP 800-53 Rev. 3. Recommended Security Controls for Federal Information Systems and Organizations; National Institute of Standards and Technology, Gaithersburg, MD, USA. 2009. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53r3.pdf (accessed on 2 April 2025).
- van Solingen, R.; Basili, V.; Caldiera, G.; Rombach, H.D. Goal Question Metric (GQM) Approach. In Encyclopedia of Software Engineering; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2002; ISBN 978-0-471-02895-6. [Google Scholar]
- Abuhussein, A.; Alsubaei, F.; Shiva, S.; Sheldon, F.T. Evaluating Security and Privacy in Cloud Services. In Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA, 10–14 June 2016; Volume 1, pp. 683–686. [Google Scholar]
- Code Spaces Forced to Close Its Doors After Security Incident|CSO Online. Available online: http://www.csoonline.com/article/2365062/disaster-recovery/code-spaces-forced-to-close-its-doors-after-security-incident.html (accessed on 26 January 2025).
- Moss, S. Major DDoS Attack on Dyn Disrupts AWS, Twitter, Spotify and More. Available online: http://www.datacenterdynamics.com/content-tracks/security-risk/major-ddos-attack-on-dyn-disrupts-aws-twitter-spotify-and-more/97176.fullarticle (accessed on 26 January 2025).
- The Hunt for ALBeast: A Technical Walkthrough|Miggo. Available online: https://www.miggo.io/resources/uncovering-auth-vulnerability-in-aws-alb-albeast (accessed on 24 February 2025).
- Weyuker, E.J. Evaluating Software Complexity Measures. IEEE Trans Softw. Eng. 1988, 14, 1357–1365. [Google Scholar] [CrossRef]
Research/Area | Key Contributions | Metrics/Models Used | Objective | Citation |
---|---|---|---|---|
Cyber and Physical Security Assessment | Security model using cybersecurity metrics to mitigate cloud threats. | MTTF, MTBF, MTTE, MTTD, MFC | Enhance understanding and mitigation of cloud threats. | [21] |
Transparency Evaluation | Empirical evaluation for cloud provider transparency. | Scorecard for security, privacy, SLAs | Help businesses assess cloud provider transparency. | [22] |
Security Comparison Model | Compared security in on-premises vs. cloud solutions. | ISO 27001:2005 | Compare security across different deployments. | [23] |
QoS and Cloud Service Prioritization | SMICloud framework for QoS measurement and service prioritization. | CSMIC SMI, AHP | Provide comparative evaluation and selection of cloud services. | [24] |
Open Source Cloud Security Assessment | Security threat analysis in multi-tenant clouds, focusing on OpenStack. | Nessus 5, CVSS | Identify vulnerabilities and advocate for network segregation. | [25] |
Cloud Service Metrics | NIST’s draft on developing cloud service metrics. | Service agreements, service measurement | Offer a framework for measuring cloud services. | [26] |
Service Selection and Recommendation | Frameworks for cloud service selection. | Fuzzy system, performance scores | Guide customers through service selection process. | [27] |
Cloud Transaction Processing Evaluation | Evaluated transaction processing in the cloud. | TPC-W Benchmark [28] | Measure and compare the performance and cost of cloud services, aiding in the selection process. | [29] |
Latency-sensitive Cloud Applications Evaluation | Efficiency evaluation for latency-sensitive applications on cloud platforms. | Performance interference analysis | Assess performance impact from shared cloud resources. | [30] |
Cloud Service Selection Based on Cost | Two-step algorithm for service selection. | Two-step algorithm | Help consumers select the best service based on cost and gains. | [31] |
Multi-criteria Cloud Service Selection | Multi-criteria methodology for service selection. | Multi-criteria methodology | Perform detailed comparison and selection process for services. | [32] |
Cloud Service Recommendation Framework | Recommender system for matching services with user requirements. | Recommender system, QoS analysis | Assist users in selecting optimal cloud services. | [33] |
Automated Cloud Storage Selection | Automated approach for selecting cloud storage services. | XML schema, performance and cost estimates | Automate cloud storage service selection for efficiency. | [34] |
QoS-aware Service Selection | Efficient selection based on QoS using mixed integer programming. | Mixed integer programming, dataset | Optimize service selection based on QoS attributes. | [35] |
Cloud Offerings Advisory Tool (COAT) | Cloud brokering system comparing service offerings. | Privacy and security requirements | Enable selection based on a comprehensive attribute set. | [36] |
Transfer Learning for Recommendation Systems | Framework leveraging transfer learning and LDA for recommendations. | Transfer Learning, LDA, word2vec | Evaluate transfer learning in addressing data scarcity in recommendations. | [37] |
Cloud Security Assessment Methodologies | Developed two methodologies for real-time security assessment: fQHP and MIP. | fQHP, MIP | Enable rapid assessment of CSPs by CSCs. | [38] |
No | Attribute | Service Type | Classifications | Sample Consideration Questions | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
SaaS | PaaS | IaaS | Tangible | Default | Fee | Service | Function | Protectability 1 | ||||||||||||
Detect | Prevent | Response | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | ||||||||||
1 | Backup | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |||||
2 | Encryption | • | • | • | • | • | • | • | • | • |
| |||||||||
3 | Authentication and Identity Management | • | • | • | • | • | • | • | • | • | • | • | • |
| ||||||
4 | Dedicated Hardware | • | • | • | • |
| ||||||||||||||
5 | Data Isolation | • | • | • | • | • | • | • |
| |||||||||||
6 | Disaster Recovery | • | • | • | • | • | • | • | • | • | • | • |
| |||||||
7 | Virtualization Security | • | • | • | • | • | • | • |
| |||||||||||
8 | Client-Side Protection | • | • | • | • | • | • | • | • | • | • | • | • |
| ||||||
9 | Service Monitoring | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |||||
10 | Access Control and Customizable Profiles | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |
11 | Datacenter Location | • | • | • | • | • | • | • | • | • | • | • |
| |||||||
12 | Security Standards and Certification | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
| ||
13 | Media Sanitization | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |||||
14 | SLA Guarantee and Conformity | • | • | • | • | • | • | • | • | • | • | • |
| |||||||
15 | Secure Scalability | • | • | • | • | • | • | • | • | • | • |
| ||||||||
16 | Secure Service Composition | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |||
17 | Software and Hardware Procurement | • | • | • | • | • | • | • | • | • | • |
| ||||||||
18 | Insider Trust | • | • | • | • | • | • | • | • | • | • |
| ||||||||
19 | Technology Change | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |||
20 | Service Self-Healing | • | • | • | • | • | • | • | • | • | • | • | • | • |
| |||||
21 | Service Availability | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
| ||
22 | Risk Management | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
| ||
23 | Security Awareness | • | • | • | • | • | • | • | • | • |
| |||||||||
24 | Secure Networking Infrastructure | • | • | • | • | • | • | • | • | • | • | • | • |
| ||||||
25 | Security Insurance | • | • | • | • | • | • | • | • | • | • | • | • | • | • |
|
Group | Tasks |
---|---|
Group 1 | Scenario 1 (SaaS, End User, Public) |
Group 2 | Scenario 2 (SaaS, End User, Private) |
Group 3 | Scenario 3 (PaaS, App Developer, Public) |
Group 4 | Scenario 4 (PaaS, App Developer, Private) |
Group 5 | Scenario 5 (IaaS, System Admin, Public) |
Group 6 | Scenario 6 (IaaS, System Admin, Private) |
Relevant | Irrelevant | |
---|---|---|
Recommended | a | b |
Not Recommended | c | d |
Group | a | b | c | d | Accuracy | Recall | Precision |
---|---|---|---|---|---|---|---|
Group 1 | 20 | 0 | 1 | 4 | 100% | 95.2% | 100% |
Group 2 | 18 | 1 | 1 | 6 | 90% | 94.7% | 94.7% |
Group 3 | 22 | 1 | 0 | 3 | 95.6% | 100% | 94.7% |
Group 4 | 19 | 0 | 2 | 4 | 100% | 90.4% | 100% |
Group 5 | 25 | 0 | 0 | 0 | 100% | 100% | 100% |
Group 6 | 23 | 1 | 0 | 1 | 95.8% | 100% | 95.8% |
Average | - | - | - | - | 96.9% | 96.7% | 97.3% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abuhussein, A.; Alsubaei, F.; Shandilya, V.; Sheldon, F.; Shiva, S. Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach. Information 2025, 16, 291. https://doi.org/10.3390/info16040291
Abuhussein A, Alsubaei F, Shandilya V, Sheldon F, Shiva S. Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach. Information. 2025; 16(4):291. https://doi.org/10.3390/info16040291
Chicago/Turabian StyleAbuhussein, Abdullah, Faisal Alsubaei, Vivek Shandilya, Fredrick Sheldon, and Sajjan Shiva. 2025. "Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach" Information 16, no. 4: 291. https://doi.org/10.3390/info16040291
APA StyleAbuhussein, A., Alsubaei, F., Shandilya, V., Sheldon, F., & Shiva, S. (2025). Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach. Information, 16(4), 291. https://doi.org/10.3390/info16040291