Security and Risk Assessment in the Cloud

被引:4
|
作者
Madria, Sanjay K. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
access control; cloud computing; cloud service providers; CSPs; DaaS; data as a service; data replication; integrity verification; PDP; provable data possession; risk assessment; Secure query processing; security; SQP;
D O I
10.1109/MC.2016.280
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fears about the data security that cloud service providers offer is a primary reason many organizations haven't fully adopted cloud services. Key issues include data storage, data replication, integrity verification, access control, risk assessment, and secure query processing.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [1] Security Risk Assessment of Cloud Carrier
    Lenkala, Swetha Reddy
    Shetty, Sachin
    Xiong, Kaiqi
    PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), 2013, : 442 - 449
  • [2] A Quantitative Methodology for Cloud Security Risk Assessment
    Basu, Srijita
    Sengupta, Anirban
    Mazumdar, Chandan
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 92 - 103
  • [3] A research for cloud computing security risk assessment
    Tang H.
    Yang J.
    Wang X.
    Zhou Q.
    Open Cybernetics and Systemics Journal, 2016, 10 : 210 - 217
  • [4] Data security and risk assessment in cloud computing
    Li, Jing
    Li, Qinyuan
    4TH ANNUAL INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN 2017), 2018, 17
  • [5] A Method of the Cloud Computing Security Management Risk Assessment
    Wang, Hongbing
    Liu, Feng
    Liu, Heng
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2012, 141 : 609 - +
  • [6] Research on the Security Risk Assessment and the Solutions of Cloud Computing
    Ding, Wen
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 481 - 486
  • [7] Overall cloud computing security risk assessment analysis
    Liu, Heng
    Wang, Hongbing
    Wang, Yong
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1521 - 1528
  • [8] A Review of Security Risk Assessment Methods in Cloud Computing
    Alturkistani, Fatimah M.
    Emam, Ahmed Z.
    NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2014, 275 : 443 - 453
  • [9] Security Risk Assessment on Cloud: A Systematic Mapping Study
    Annunziata, Giusy
    Sheykina, Alexandra
    Palomba, Fabio
    De Lucia, Andrea
    Catolino, Gemma
    Ferrucci, Filomena
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 604 - 613
  • [10] Security risk assessment framework for cloud computing environments
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2114 - 2124