Modeling Security Risk Factors in a Cloud Computing Environment

With the rapid developments in information technologies and the success of Internet, computing resources have become cheaper, more powerful, and more available than before. This technological development has enabled the realization of long held dream called “computing as utility”, in which resources are provided as a general utility that can be leased and released by users through the Internet in an ondemand fashion. It emerged in to the market with a huge potential to fulfill this dream and many attractive promises that are inviting to many con summers around the world. As such, it offers many advantage, in terms of reduced cost, relief from managing complex IT infrastructure, flexibility, and scalability. However, cloud computing is a risky paradigm. For instance, the use of cloud services, which are external assets to their consumers, implies unprecedented risks that must be taken in account. |This paper highlights and categorizes risk factors associated with security involved in cloud computing and list some remediation to avoid these risks and help promote the benefits and mitigate the risks associated with cloud

[1]  Thar Baker,et al.  Security-oriented cloud computing platform for critical infrastructures , 2012, Comput. Law Secur. Rev..

[2]  Iliya Markov,et al.  Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..

[3]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[4]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[5]  Deepak H. Sharma,et al.  Cloud Computing - Understanding Risk, Threats, Vulnerability and Controls: A Survey , 2013 .

[6]  Kamal Dahbur,et al.  A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  Naixue Xiong,et al.  Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications , 2014, Inf. Sci..

[9]  Ali Mili,et al.  A cybersecurity model in cloud computing environments , 2013, J. King Saud Univ. Comput. Inf. Sci..

[10]  Vidyanand Choudhary,et al.  Software as a Service: Implications for Investment in Software Development , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[11]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[12]  A. Leite,et al.  Commentary: Cloud computing - A security problem or solution? , 2011, Inf. Secur. Tech. Rep..

[13]  Christopher J. Novak,et al.  2009 Data Breach Investigations Report , 2009 .

[14]  George Reese,et al.  Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .

[15]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[16]  Rosli Salleh,et al.  A Survey on Cloud Computing Security , 2012, ArXiv.

[17]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[18]  Jordi Guitart,et al.  Business-driven management of infrastructure-level risks in Cloud providers , 2014, Future Gener. Comput. Syst..

[19]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[20]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[21]  Paula Kotzé,et al.  Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.

[22]  M. Avram,et al.  Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .

[23]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[24]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[25]  S Drissi,et al.  Survey: Risk Assessment for Cloud Computing , 2013 .

[26]  Rabiah Ahmad,et al.  A conceptual framework of info structure for information security risk assessment (ISRA) , 2013, J. Inf. Secur. Appl..

[27]  Paul T. Jaeger,et al.  Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..

[28]  Vasudeva Varma,et al.  Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.

[29]  Patrick S. Ryan,et al.  Trust in the clouds , 2012, Comput. Law Secur. Rev..

[30]  Liu Dong,et al.  The New Risk Assessment Model for Information System in Cloud Computing Environment , 2011 .

[31]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .