Evaluation of Cloud Computing Offers through Security Risks An Industrial Case Study

被引:1
|
作者
Remiche, Jean-Michel [1 ]
Aubert, Jocelyn [2 ]
Mayer, Nicolas [2 ]
Petrocelli, David [1 ]
机构
[1] POST Telecom, 1 Rue Emile Bian, Luxembourg, Luxembourg
[2] Luxembourg Inst Sci & Technol, 5 Ave Hauts Fourneaux, Esch Sur Alzette, Luxembourg
关键词
Cloud Computing; Security Risk Management; Industrial Case Study;
D O I
10.5220/0006665703380345
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud provider selection is a difficult task, even more when security is a critical aspect of the processes to be moved on the cloud. To support cloud offer selection by a cloud consumer, we have introduced an innovative risk-based approach, proposing to distribute risk assessment activities between the cloud provider and the cloud consumer. This paper proposes an evaluation of this approach by assessing and comparing the portfolio of offers of POST Telecom, a cloud provider in Luxembourg. The case study will cover the evaluation of the offers with the help of standard security controls provided by three leading cloud organizations: Cloud Security Alliance, ISO/IEC and SANS Institute.
引用
收藏
页码:338 / 345
页数:8
相关论文
共 50 条
  • [31] Study of Security Mechanisms Implemented in Cloud Computing
    Elhouni, Abobaker
    Elfgee, ElBahlul
    Isak, Mohamed A.
    Ben Ammer, Khaled
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [32] Study on the security models and strategies of cloud computing
    Che, Jianhua
    Duan, Yamin
    Zhang, Tao
    Fan, Jie
    PEEA 2011, 2011, 23
  • [33] Study on the Security of the Databases in Cloud Computing Environment
    Gele, Aori
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 473 - 476
  • [34] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [35] Security Issues Model on Cloud Computing: A Case of Malaysia
    Raisian, Komeil
    Yahaya, Jamaiah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (08) : 216 - 223
  • [36] Detection and elimination of project engineering security risks from the perspective of cloud computing
    Wang, Xiquan
    Pan, Zhen
    Zhang, Juan
    Huang, Jiao
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021,
  • [37] Assessing information security risks in the cloud: A case study of Australian local government authorities
    Ali, Omar
    Shrestha, Anup
    Chatfield, Akemi
    Murray, Peter
    GOVERNMENT INFORMATION QUARTERLY, 2020, 37 (01)
  • [38] Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education
    Qashou, Abeer M. Azem
    Bahar, Nurhidayah
    Mohamed, Hazura
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [39] Modeling Cloud Computing security scenarios through attack trees
    Bolivar, Holman
    Jaimes Parada, Hector Dario
    Roa, Olga
    2019 CONGRESO INTERNACIONAL DE INNOVACION Y TENDENCIAS EN INGENIERIA (CONIITI ), 2019,
  • [40] Enhance Security of Cloud Computing through Fork Virtual Machine
    Elham, Hafida
    Lebbat, Adil
    Medromi, Hicham
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 448 - 451