Evaluation of Cloud Computing Offers through Security Risks An Industrial Case Study

被引:1
|
作者
Remiche, Jean-Michel [1 ]
Aubert, Jocelyn [2 ]
Mayer, Nicolas [2 ]
Petrocelli, David [1 ]
机构
[1] POST Telecom, 1 Rue Emile Bian, Luxembourg, Luxembourg
[2] Luxembourg Inst Sci & Technol, 5 Ave Hauts Fourneaux, Esch Sur Alzette, Luxembourg
关键词
Cloud Computing; Security Risk Management; Industrial Case Study;
D O I
10.5220/0006665703380345
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud provider selection is a difficult task, even more when security is a critical aspect of the processes to be moved on the cloud. To support cloud offer selection by a cloud consumer, we have introduced an innovative risk-based approach, proposing to distribute risk assessment activities between the cloud provider and the cloud consumer. This paper proposes an evaluation of this approach by assessing and comparing the portfolio of offers of POST Telecom, a cloud provider in Luxembourg. The case study will cover the evaluation of the offers with the help of standard security controls provided by three leading cloud organizations: Cloud Security Alliance, ISO/IEC and SANS Institute.
引用
收藏
页码:338 / 345
页数:8
相关论文
共 50 条
  • [21] Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study
    Gill, Sajid Habib
    Razzaq, Mirza Abdur
    Ahmad, Muneer
    Almansour, Fahad M.
    Ul Haq, Ikram
    Jhanjhi, N. Z.
    Alam, Malik Zaib
    Masud, Mehedi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01): : 117 - 128
  • [22] Cloud Computing Security Case Studies and Research
    Barron, Chimere
    Yu, Huiming
    Zhan, Justin
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1287 - 1291
  • [23] Industrial edge cloud in the smart factories Failover and security for industrial edge computing
    Gezer, Volkan
    Harms, Carsten
    Brueggemann, Carsten
    Pfeifer, Michael
    Michael, Andreas
    Althoff, Simon
    Runge, Torsten
    Ruskowski, Martin
    Sivalingam, Keran
    ATP MAGAZINE, 2022, (04): : 54 - 61
  • [24] Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study
    Baars, Thijs
    Spruit, Marco
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (12) : 1662 - 1678
  • [25] Evaluation and Analysis on Security Framework Model of Cloud Computing
    Li, Zhao
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 572 - 578
  • [26] Evaluation of The faults of Data Security and Privacy in the Cloud Computing
    Waleed, Al-Museelem
    Li Chunlin
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1838 - 1843
  • [27] Network Security Evaluation Model Based on Cloud Computing
    Yang, Jin
    Wang, Cilin
    Yu, Le
    Liu, Caiming
    Peng, Lingxi
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 488 - 495
  • [28] A Study on Security Mitigation Models in Cloud Computing
    Tanna, Maulik
    Sridaran, R.
    Dobariya, Ashwin
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 446 - 450
  • [29] A Comparative Study of Trends in Security in Cloud Computing
    Khan, Abdul Muttalib
    Ahmad, Shish
    Haroon, Mohd.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 586 - 590
  • [30] Study on Data Security Mechanism in Cloud Computing
    Sandha
    Durga, M. Ganaga
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 13 - 17