Cloud computing: Overview and risk identification based on classification by type

The Cloud Computing is experiencing a powerful and very fast development in the IT field. Based on the principle of virtualization, it allows the consumer to use computing resources on demand, by means of the Internet, regardless of location and time. This technology also ensures broadband network access with fast resizing as required by the user. Finally, the invoicing is determined according to the usage. However, the pooling of resources increases the number of risks affecting the properties of; Confidentiality, availability and integrity. These risks are related to several factors; Data location, loss of governance and others. Unlike other works in which the risk analysis in Cloud Computing is done passively. This work aims to make a thorough study to identify the set of security risks in a cloud environment in a structured way, by classifying them by types of service as well as by deployment and hosting models. This classification is fundamental since, except for the common risks, there are others which depend on the type of used cloud and which must be determined.

[1]  Chia-Lun Yeh,et al.  Cloud Computing: Overview and Risk Analysis , 2012, J. Inf. Syst..

[2]  Burton S. Kaliski,et al.  Toward Risk Assessment as a Service in Cloud Environments , 2010, HotCloud.

[3]  Ahmed Lounis,et al.  Security in cloud computing , 2014, International Journal of Information Security.

[4]  Roger Clarke,et al.  User Requirements for Cloud Computing Architecture , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[5]  Hiroyuki Sato,et al.  Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.

[6]  Mohammed El Ghazi,et al.  Cloud computing: Security challenges , 2012, 2012 Colloquium in Information Science and Technology.

[7]  Thibaut Probst Évaluation et analyse des mécanismes de sécurité des réseaux dans les infrastructures virtuelles de cloud computing. (Evaluation and analysis of network security mechanisms in virtual infrastructure cloud) , 2015 .

[8]  Cyril Onwubiko,et al.  Security Issues to Cloud Computing , 2010, Cloud Computing.

[9]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[10]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[11]  Anderson Santana de Oliveira,et al.  A risk assessment model for selecting cloud service providers , 2016, Journal of Cloud Computing.

[12]  Iliya Markov,et al.  Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..

[13]  Adil Al-Yasiri,et al.  Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework , 2016, FNC/MobiSPC.

[14]  Kamal Dahbur,et al.  A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.

[15]  William R. Claycomb,et al.  Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[16]  Haider Abbas,et al.  Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .

[17]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[18]  Sara Bedin Cloud Computing : evolution or revolution ? , 2014 .

[19]  Elio Goettelmann,et al.  Risk-aware Business Process Modelling and Trusted Deployment in the Cloud. (Modélisation de processus métiers sensibilisés aux risques et déploiement en confiance dans le cloud) , 2015 .

[20]  Jaydip Sen,et al.  Security and Privacy Issues in Cloud Computing , 2013, ArXiv.

[21]  Myeonggil Choi The Security Risks of Cloud Computing , 2019 .

[22]  R. K. Bunkar,et al.  Study of Security Risk and Vulnerabilities of Cloud Computing , 2014 .

[23]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[24]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[25]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[26]  Mridula Angepat,et al.  Cloud Computing : Analysing the risks involved in cloud computing environments , 2010 .

[27]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .