Awesome and Dark Tactics
Homepage Catalog Tag Selection Contributions
All Tags AWS algorithm-design architecture cloud-principles cost-reduction data-centric data-compression data-processing deployment design edge-computing energy-footprint hardware libraries locality machine-learning management measured migration model-optimization model-training performance queries rebuilding scaling services strategies template workloads

<- Back to category

Tactic: Security threat

Tactic sort: Dark Tactic
Type: Unsustainable Pattern
Category: cloud-computing
Tags:

Title

Security threat

Description

There are multiple security concerns in cloud computing. One of them, is when the cloud user grants unsupervised access to her own device. This may lead to sensitive information leak if either the cloud provider misuses his access rights or does not provide enough security to prevent third-party attacks. These two issues are related to two of the top threats to cloud computing.

Participant

cloud-user, cloud-provider

Related artifact

Cloud utility services (automatic updates)

Context

Normal operation

Feature

Data protection

Tactic intent

Granting unsupervised access to own device (by cloud user)

Intent measure

Security breaches

Countermeasure

Examples can be found in the important body of work about cloud security issues and solutions (see the paper for references).

Source

*The Dark Side of Cloud and Edge Computing* by Klervie Toczé, Maël Madon, Muriel Garcia and Patricia Lago (DOI: https://doi.org/10.21428/bf6fb269.9422c084)


Graphical representation

  • Contact person
  • Patricia Lago (VU Amsterdam)
  •  disc at vu.nl
  •  patricialago.nl

The Archive of Awesome and Dark Tactics (AADT) is an initiative of the Digital Sustainability Center (DiSC). It received funding from the VU Amsterdam Sustainability Institute, and is maintained by the S2 Group of the Vrije Universiteit Amsterdam.

Initial development of the Archive of Awesome and Dark Tactics by Robin van der Wiel