A Security Threats Measurement Model for Reducing Cloud Computing Security Risk

被引:3
|
作者
Lai, Sen-Tarng [1 ]
Leu, Fang-Yie [2 ]
机构
[1] Shih Chien Univ, Dept Informat Technol & Management, Taipei 10462, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
关键词
cloud computing; security threats measurement; security factors; evaluation procedure; service provider;
D O I
10.1109/IMIS.2015.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the trend of information resources sharing and also an important tool for enterprises or organizations to enhance competitiveness. Users have the flexibility to adjust request and configuration. However, network security and resource sharing issues have continued to threaten the operation of cloud computing, making cloud computing security encounter serious test. How to evaluate cloud computing security has become a topic worthy of further exploration. Combining system, management and technique three levels security factors, this paper proposes a Security Threats Measurement Model (STMM). Applying the STMM, security of cloud computing system environment can be effectively evaluated and cloud computing security defects and problems can be concretely identified. Based on the evaluation results, the user can choice the higher security service provider or request the service provider security improvement actions.
引用
收藏
页码:414 / 419
页数:6
相关论文
共 50 条
  • [1] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [2] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [3] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [4] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [5] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    [J]. Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71
  • [6] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    [J]. Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [7] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [8] Security threats of virtualization in cloud computing
    [J]. Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):
  • [9] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [10] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32