Evaluation of Cloud Computing Offers through Security Risks An Industrial Case Study

被引:1
|
作者
Remiche, Jean-Michel [1 ]
Aubert, Jocelyn [2 ]
Mayer, Nicolas [2 ]
Petrocelli, David [1 ]
机构
[1] POST Telecom, 1 Rue Emile Bian, Luxembourg, Luxembourg
[2] Luxembourg Inst Sci & Technol, 5 Ave Hauts Fourneaux, Esch Sur Alzette, Luxembourg
关键词
Cloud Computing; Security Risk Management; Industrial Case Study;
D O I
10.5220/0006665703380345
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud provider selection is a difficult task, even more when security is a critical aspect of the processes to be moved on the cloud. To support cloud offer selection by a cloud consumer, we have introduced an innovative risk-based approach, proposing to distribute risk assessment activities between the cloud provider and the cloud consumer. This paper proposes an evaluation of this approach by assessing and comparing the portfolio of offers of POST Telecom, a cloud provider in Luxembourg. The case study will cover the evaluation of the offers with the help of standard security controls provided by three leading cloud organizations: Cloud Security Alliance, ISO/IEC and SANS Institute.
引用
收藏
页码:338 / 345
页数:8
相关论文
共 50 条
  • [1] The Security Risks of Cloud Computing
    Choi, Myeonggil
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 330 - 330
  • [2] Security Risks and their Management in Cloud Computing
    Khan, Afnan Ullah
    Oriol, Manuel
    Kiran, Mariam
    Jiang, Ming
    Djemame, Karim
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [3] Evaluating Risks in Cloud Computing: Security Perspective
    Dhingra, Amit Kumar
    Rai, Dinesh
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 533 - 536
  • [4] Cloud Computing: Potential Risks and Security Approaches
    Ben Rebah, Hassen
    Ben Sta, Hatem
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016), 2018, 208 : 69 - 78
  • [5] Mitigation for cloud computing security risks and governance
    Jabez, J.
    Narmadha, R.
    Porkodi, S.
    Devi, L.
    International Journal of Cloud Computing, 2022, 11 (5-6) : 560 - 567
  • [6] A Case Study in Inspecting the Cost of Security in Cloud Computing
    Naser, Said
    Kamil, Said
    Thomas, Nigel
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2015, 318 : 179 - 196
  • [7] Cloud Computing: Benefits, Risks and Recommendations for Information Security
    Catteddu, Daniele
    WEB APPLICATION SECURITY, 2010, 72 : 17 - 17
  • [8] On data and virtualization security risks and solutions of cloud computing
    Luo, X. (xiangyangluo@126.com), 1600, Academy Publisher (09):
  • [9] Establishment of the security risks taxonomy in cloud computing environment
    Grubor, Gojko
    Njeguš, Angelina
    Regodić, Dušan
    Metalurgia International, 2013, 18 (12): : 75 - 79
  • [10] A Case Study for the Cloud Computing Security Threats in a Governmental Organization
    Albakri, Sameer Hasan
    Shanmgam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 452 - 457