Survey: Risk assessment models for cloud computing: evaluation criteria

被引:0
|
作者
Mannane, Nada [1 ]
Bencharhi, Youssef [1 ]
Boulafdour, Brahim [1 ]
Regragui, Boubker [1 ]
机构
[1] Univ Mohammed V Souissi, ENSIAS, SIME Lab, Informat Proc & E Stratergy Res Team, Rabat, Morocco
来源
PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH) | 2017年
关键词
Cloud Computing; Risk assessment; Information security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most challenging steps in migrating infrastructure or an application to a cloud computing is security threats. Adapting a current risk assessment tool to cloud computing is a very difficult task due to its several characteristics and the use of distributed systems. This work proposes a critical review of the recent proposed risk assessment frameworks and models in cloud computing environments. The aim of this paper is comparing the latest models of risk assessment in cloud computing in order to identify the strengths and weaknesses of each model and propose a list of evaluation criteria to be used while analyzing risk approaches.
引用
收藏
页码:112 / 116
页数:5
相关论文
共 50 条
  • [21] A survey on security issues in service delivery models of cloud computing
    Subashini, S.
    Kavitha, V.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 1 - 11
  • [22] Cloud computing security: A survey of service-based models
    Parast, Fatemeh Khoda
    Sindhav, Chandni
    Nikam, Seema
    Yekta, Hadiseh Izadi
    Kent, Kenneth B.
    Hakak, Saqib
    COMPUTERS & SECURITY, 2022, 114
  • [23] Survey of Centralized and Decentralized Access Control Models in Cloud Computing
    Almutairi, Suzan
    Alghanmi, Nusaybah
    Monowar, Muhammad Mostafa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (02) : 339 - 346
  • [24] A Survey on Cloud Computing
    Shaw, Subhadra Bose
    Singh, A. K.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [25] A Method of the Cloud Computing Security Management Risk Assessment
    Wang, Hongbing
    Liu, Feng
    Liu, Heng
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2012, 141 : 609 - +
  • [26] Research on the Security Risk Assessment and the Solutions of Cloud Computing
    Ding, Wen
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 481 - 486
  • [27] Overall cloud computing security risk assessment analysis
    Liu, Heng
    Wang, Hongbing
    Wang, Yong
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1521 - 1528
  • [28] A Review of Security Risk Assessment Methods in Cloud Computing
    Alturkistani, Fatimah M.
    Emam, Ahmed Z.
    NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2014, 275 : 443 - 453
  • [29] Security risk assessment framework for cloud computing environments
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2114 - 2124
  • [30] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287