Home // CLOUD COMPUTING 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization // View article
PERTD - Cloud Application Threat Modeling
Authors:
Aspen Olmsted
Keywords: cyber-security; software engineering; software development lifecycle
Abstract:
This research work investigates the problem of developing secure cloud software applications. Currently, proposed solutions focus on data flow across so-called trust boundaries. The challenge with the current approach is that many of our applications' threats are not from malicious users. Many threats come from poor design, misunderstanding of use cases, and a lack of planning for environmental changes. This research focuses on the challenges of developing secure cloud software applications. Current proposed solutions primarily address data flow across designated trust boundaries. However, many of the threats to our applications do not stem from malicious users. Instead, they often arise from poor design, misunderstandings of use cases, and insufficient planning for environmental changes. Our work aims to model a distributed process that allows us to identify risks to the cloud software during the design phase and implement strategies to mitigate those risks.
Pages: 63 to 68
Copyright: Copyright (c) IARIA, 2025
Publication date: April 6, 2025
Published in: conference
ISSN: 2308-4294
ISBN: 978-1-68558-258-6
Location: Valencia, Spain
Dates: from April 6, 2025 to April 10, 2025