2014
DOI: 10.1007/978-3-319-05951-8_42
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Security Risk Assessment Methods in Cloud Computing

Abstract: Abstract. The Cloud computing is a major technological trend that continues to evolve and flourish. It has potential benefits in achieving rapid and scalable resource provisioning capabilities as well as resource sharing. However, a number of security risk are emerging in association with cloud usage that need to be assessed before cloud computing is adopted. This paper presents a review of the security risk assessment methods in cloud computing. The paper aims to summarize, organize and classify the informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…However, the cloud computing environment is different from the traditional enterprise environment and the characteristics of the cloud model invalidate this assumption making the traditional methods unfit for cloud environment [6]. In addition, these methods do not readily fit the dynamic nature of clouds, which are characterized by on demand self-service and rapid elasticity [9].…”
Section: Cloud Security Risk Managementmentioning
confidence: 99%
See 4 more Smart Citations
“…However, the cloud computing environment is different from the traditional enterprise environment and the characteristics of the cloud model invalidate this assumption making the traditional methods unfit for cloud environment [6]. In addition, these methods do not readily fit the dynamic nature of clouds, which are characterized by on demand self-service and rapid elasticity [9].…”
Section: Cloud Security Risk Managementmentioning
confidence: 99%
“…Security assessment in cloud is a challenging domain and identifying security risks that may face the cloud customer is a complex task [9]. The cloud customer is not allowed to assess the security risks of the CSP since hackers who claimed to be customers may use the result of the risk assessment to exploit the vulnerability of the CSP [6].…”
Section: Cloud Security Risk Managementmentioning
confidence: 99%
See 3 more Smart Citations