2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies 2015
DOI: 10.1109/ngmast.2015.25
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Risk Management: A Critical Review

Abstract: Cloud computing has created a remarkable paradigm shift in the IT industry and brought several advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. These advantages enabled cloud to have significant impact on different sectors of smart cites. However, cloud adoption has increased the sophistication of the ever changing security risks which frustrate enterprises on expanding their on-premises infrastructure towards cloud horizons. These risks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Risks in context to Information Security are always uncertain and its mitigation process cannot be fully achieved until the objectives and strategies of the business are clear. Context establishment means to define the scope of all processes involved in the risk management and also sets the criteria to assess the tasks for the mitigation of risks [23]. The scope of risk management must be within limit of the organizational goals and objectives.…”
Section: Context Establishmentmentioning
confidence: 99%
“…Risks in context to Information Security are always uncertain and its mitigation process cannot be fully achieved until the objectives and strategies of the business are clear. Context establishment means to define the scope of all processes involved in the risk management and also sets the criteria to assess the tasks for the mitigation of risks [23]. The scope of risk management must be within limit of the organizational goals and objectives.…”
Section: Context Establishmentmentioning
confidence: 99%
“…The attacker (or attackers, as is the case in distributed denial-of service (DDoS) attacks) attacks typically flood servers, systems or networks with traffic by way of obliging the prevents legitimate users to consume inordinate quantities of finite system resources like memory, processor power, disk space or network bandwidth [20,21,23]. Consequently, this produces an intolerable system slowdown and leaves all of the victim cloud service perplexed and furious as to why the service isn't responding [9,12,19,42,43,73,77].…”
Section: Technical Issuesmentioning
confidence: 99%
“…Cloud Risks Classification. Cloud risks classification is not a well-defined scientific problem [2,21,22]. In [21] authors distinguish the following groups of risks: information security, operations management, change management, disaster recovery, service level management, interface management, regulations and legislation.…”
Section: State Of the Artmentioning
confidence: 99%
“…ENISA's list of risk scenarios and their categories include the following [1,22]: policy & organizational, technical, legal, etc. According to the information presented in [2], most of cloud security risks can be categorized using application and network levels, data storage risks, etc. We propose to use the following groups of risks: information, resource, organizational, financial, social, operational, reputation, legal.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation