2017
DOI: 10.24178/irjece.2017.3.2.07
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment for Cloud Computing

Abstract: Abstract—The broad implementation of cloud computing has brought a dramatic change to multiple industries, which derives from the development of the Internet-related technologies. Cloud service providers have untangled a lot of issues to maintain a robust quality of service. Despite the utilization of proficient techniques in resource management that has made optimal planning possible, as one resource is allocated to multiple users the risk of resources unavailability in cloud computing is still present. The l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Also, with 1.8 billion vulnerable open source components downloaded in 2015 and at least 26% of the most common open-source component having high-risk vulnerabilities, the risks of multicloud systems would seem to be on an ever-increasing trajectory. In an attempt to address the challenges of assessing cloud risks, numerous scholars have developed conceptual models [7][8][9][10][11]. While some of these studies have concentrated on cloud adoption risk assessment, others have followed the traditional route to security risk assessment, adapting the traditional risk frameworks, for example, ISO/IEC 27005, ISO/IEC 31000 and NIST 800-30v1.…”
Section: Introductionmentioning
confidence: 99%
“…Also, with 1.8 billion vulnerable open source components downloaded in 2015 and at least 26% of the most common open-source component having high-risk vulnerabilities, the risks of multicloud systems would seem to be on an ever-increasing trajectory. In an attempt to address the challenges of assessing cloud risks, numerous scholars have developed conceptual models [7][8][9][10][11]. While some of these studies have concentrated on cloud adoption risk assessment, others have followed the traditional route to security risk assessment, adapting the traditional risk frameworks, for example, ISO/IEC 27005, ISO/IEC 31000 and NIST 800-30v1.…”
Section: Introductionmentioning
confidence: 99%
“…QUIRC defines risk as a product of the Probability (P e) of a security compromise, i.e. a threat event, e, occurring, and its potential Impact Ie, where Ie is assigned a value on a numerical scale based on the Federal Information Processing Standards (FIPS) model [73] of Low (1-5), Moderate (6-10) or High (11)(12)(13)(14)(15). The calculation of the risk of an application based on a single security objective is represented by Rs, which is the average over the cumulative weighted sum of n threats which map to a particular SO category.…”
Section: Quircmentioning
confidence: 99%
“…The work of Fito et al [43] stands out as another suitable alternative, except for their concentration on business level objectives and the lack of emphasis on security risks in the application of the SEmi-quantitative BLO-driven Cloud Risk Assessment (SEBCRA) model in a CSP environment. Some of the excluded papers did not give a practical example of the model's application [50,51], while others did not explicitly consider the supply chain [10,11] in their risk assessment process.…”
Section: Reflecting On Current Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Numerous scholars have developed conceptual models [6], [7], [17] to assess cloud risk. While some of these have concentrated on cloud adoption risk assessment, others have followed the traditional route to security assessment, adapting the traditional frameworks, e.g.…”
Section: Background and Related Workmentioning
confidence: 99%