2016
DOI: 10.1109/tcc.2014.2344653
|View full text |Cite
|
Sign up to set email alerts
|

A Risk Assessment Framework for Cloud Computing

Abstract: Abstract-Cloud service providers offer access to their resources through formal Service Level Agreements (SLA), and need wellbalanced infrastructures so that they can maximise the Quality of Service (QoS) they offer and minimise the number of SLA violations. This paper focuses on a specific aspect of risk assesment as applied in cloud computing: methods within a framework that can be used by cloud service providers and service consumers to assess risk during service deployment and operation. It describes the v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(42 citation statements)
references
References 23 publications
0
40
2
Order By: Relevance
“…A sample of four such academic papers are in Brender and Markov (), Fan, Chiang, and Kao (), Fang and Chen (), Zhang, Wuwong, Li, and Zhang (). (c) There are those from the IEEE Xplore databases when the keyword CCRM is given, such as Buyya, Yeo, and Venugopal (), Djemame, Armstrong, Guitart, and Macias (), El Kefel and Mohamed (), Medhioub, Hamdi, and Kim (), Tanimoto, Hiramoto, Iwashita, Sato, and Kanai (). (d) Last but not least, the key term of “with Digital Simulation” is added to the latter keyword.…”
Section: Literature Survey Discussion and Further Reviewsmentioning
confidence: 99%
“…A sample of four such academic papers are in Brender and Markov (), Fan, Chiang, and Kao (), Fang and Chen (), Zhang, Wuwong, Li, and Zhang (). (c) There are those from the IEEE Xplore databases when the keyword CCRM is given, such as Buyya, Yeo, and Venugopal (), Djemame, Armstrong, Guitart, and Macias (), El Kefel and Mohamed (), Medhioub, Hamdi, and Kim (), Tanimoto, Hiramoto, Iwashita, Sato, and Kanai (). (d) Last but not least, the key term of “with Digital Simulation” is added to the latter keyword.…”
Section: Literature Survey Discussion and Further Reviewsmentioning
confidence: 99%
“…To quantify this risk which is due to data leakage attack across cloud tenants, we adopt the definition of risk by ISO 27005 as: "The potential that a given threat will exploit vulnerability of an asset or group of assets and thereby cause harm to the organization". The quantitative risk is the product of the likelihood of the attack and its consequences or impact [15]. The likelihood of an attack depends on the vulnerabilities of the system and the attacker threat.…”
Section: Cloud Vulnerability and Riskmentioning
confidence: 99%
“…On the one hand, this system should be responsive to the big volume of the data and, on the other hand, it should have low cost. The issue of lowering the energy costs has been investigated in different ways in the system [24]. We therefore propose a method based on the cloud computing that its cost is low as the services are provided over time.…”
Section: Workflow Management Systemmentioning
confidence: 99%
“…We initially estimate the system failure rate based on the Poisson distribution like [24]. Then, we must balance the systems loads with the migration of workflows in the proposed framework.…”
Section: Workflow Management Model Based On Cloud Computingmentioning
confidence: 99%