Survey: Risk assessment models for cloud computing: evaluation criteria

被引:0
|
作者
Mannane, Nada [1 ]
Bencharhi, Youssef [1 ]
Boulafdour, Brahim [1 ]
Regragui, Boubker [1 ]
机构
[1] Univ Mohammed V Souissi, ENSIAS, SIME Lab, Informat Proc & E Stratergy Res Team, Rabat, Morocco
来源
PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH) | 2017年
关键词
Cloud Computing; Risk assessment; Information security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most challenging steps in migrating infrastructure or an application to a cloud computing is security threats. Adapting a current risk assessment tool to cloud computing is a very difficult task due to its several characteristics and the use of distributed systems. This work proposes a critical review of the recent proposed risk assessment frameworks and models in cloud computing environments. The aim of this paper is comparing the latest models of risk assessment in cloud computing in order to identify the strengths and weaknesses of each model and propose a list of evaluation criteria to be used while analyzing risk approaches.
引用
收藏
页码:112 / 116
页数:5
相关论文
共 50 条
  • [31] A Study of Risk Evaluation Framework for Cloud Computing System
    Lin, Fan
    Xiahou, Jianbin
    Zeng, Wenhua
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1351 - 1366
  • [32] Reference Assessment Criteria of the Committee for Risk Assessment (RAC): A Survey
    Nies, E.
    Pueringer, J.
    GEFAHRSTOFFE REINHALTUNG DER LUFT, 2017, 77 (06): : 266 - 268
  • [33] Cloud Computing and Load Balancing in Cloud Computing-Survey
    Jyoti, Amrita
    Shrimali, Manish
    Mishra, Rashmi
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 51 - 55
  • [34] A Novel Evaluation Criteria to Cloud Based Access Control Models
    Younis, A. Younis
    Kifayat, Kashif
    Merabti, Madjid
    2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 68 - 73
  • [35] Cloud Computing Security: A Survey
    Khalil, Issa M.
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTERS, 2014, 3 (01) : 1 - 35
  • [36] A Survey on the Security of Cloud Computing
    Alhenaki, Lubna
    Alwatban, Alaa
    Alamri, Bashaer
    Alarifi, Noof
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [37] A survey on the scope of cloud computing
    Agarwal, Parul
    Sharma, Dilip Kumar
    Varun, V. L.
    Venkatesh, Pruthvi Raj
    Kanchibhotla, Chaitanya
    Ventayen, Randy Joy Magno
    Mohiddin, Md Khaja
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 861 - 864
  • [38] Mobile cloud computing: A survey
    Fernando, Niroshinie
    Loke, Seng W.
    Rahayu, Wenny
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01): : 84 - 106
  • [39] Elasticity in cloud computing: a survey
    Coutinho, Emanuel Ferreira
    de Carvalho Sousa, Flavio Rubens
    Leal Rego, Paulo Antonio
    Gomer, Danielo Goncalves
    de Souza, Jose Neuman
    ANNALS OF TELECOMMUNICATIONS, 2015, 70 (7-8) : 289 - 309
  • [40] A Survey of Mobile Cloud Computing
    Xiaopeng Fan 1
    2. Department of Computing
    3. Department of Land Surveying and Geo-informatics
    ZTE Communications, 2011, 9 (01) : 4 - 8