2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering 2011
DOI: 10.1109/cnsi.2011.82
|View full text |Cite
|
Sign up to set email alerts
|

Risk Management on the Security Problem in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(13 citation statements)
references
References 1 publication
0
13
0
Order By: Relevance
“…Analyst firm Gartner published a 2008 report on cloud computing where it warned customers to select their cloud computing provider very carefully and to consider seven specific security issues: privileged user access , regulatory compliance , data location , data segregation , recovery , investigative support , and long‐term viability . On the basis of previous studies , 32 risks were identified, some new and some pre‐existing . Some studies on cloud computing saw risks from the clients' perspective and identified 23 risks.…”
Section: Security Risk Assessment In Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Analyst firm Gartner published a 2008 report on cloud computing where it warned customers to select their cloud computing provider very carefully and to consider seven specific security issues: privileged user access , regulatory compliance , data location , data segregation , recovery , investigative support , and long‐term viability . On the basis of previous studies , 32 risks were identified, some new and some pre‐existing . Some studies on cloud computing saw risks from the clients' perspective and identified 23 risks.…”
Section: Security Risk Assessment In Cloud Computingmentioning
confidence: 99%
“…Surveys conducted by the International Data Corporation (IDC) Enterprise Panel in 2008 and 2009 showed that Chief Information Officers (CIOs) consider confidentiality, availability, and reliability as primary concerns . Similarly, 70% of the respondents in a survey from Japan conferred their concerns on the security in cloud computing . In addition, the European Network and Information Security Agency conducted a survey of small and medium‐sized businesses, which confirmed that their major concern on cloud computing included data confidentiality and liability for incidents that involved the infrastructure .…”
Section: Introductionmentioning
confidence: 99%
“…The model is built by representing communications as a directed graph and then established a matrix to discover the risk. Furthermore, in [23] a hybrid risk-analysis method based on decision tree analysis (quantities) and risk matrix (qualitative) is proposed for risk assessment. In this method, risk factor from a user's viewpoint is systematically extracted with the Risk Breakdown Structure (RBS) method then analyzed and evaluated.…”
Section: ) Risk Assessment As a Servicementioning
confidence: 99%
“…However, a simple method for qualitative or quantitative analysis will lead to the inaccuracy and one-sidedness of the evaluation results. Therefore, several studies used an integrated method of qualitative and quantitative analysis to assess risk in cloud environment [4], [20], [23], [30]. 3) Graphs analysis assessment: Graphs and mathematical models can be used to address and calculate security risk in clouds by simulating attacker possibilities.…”
Section: ) Risk Assessment As a Servicementioning
confidence: 99%
“…Most of the information is processed and stored electronically and transmitted across company's network or internet. This is risky because of an attacker or business competitor can break security parameters in order to get access to the information [6], [7]. Vulnerability always exists in a system or application updates, and it may cause a security breach in the private information [8].…”
mentioning
confidence: 99%