Security and Risk Assessment in the Cloud

被引:4
|
作者
Madria, Sanjay K. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
access control; cloud computing; cloud service providers; CSPs; DaaS; data as a service; data replication; integrity verification; PDP; provable data possession; risk assessment; Secure query processing; security; SQP;
D O I
10.1109/MC.2016.280
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fears about the data security that cloud service providers offer is a primary reason many organizations haven't fully adopted cloud services. Key issues include data storage, data replication, integrity verification, access control, risk assessment, and secure query processing.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [41] Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment
    Samy, Ganthan Narayana
    Albakri, Sameer Hasan
    Maarop, Nurazean
    Magalingam, Pritheega
    Wong, Doris Hooi-Ten
    Shanmugam, Bharanidharan
    Perumal, Sundresan
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 566 - 578
  • [42] Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory
    Huang, Liangliang
    Shen, Yongjun
    Zhang, Guidong
    Luo, Huixia
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 11 - 15
  • [43] Security and privacy of digital economic risk assessment system based on cloud computing and blockchain
    Wenjin Jin
    Soft Computing, 2024, 28 : 2753 - 2768
  • [44] An improved FAHP-cloud-based security risk assessment model for airborne networks
    Wang, Jing
    Li, Jingwen
    Li, Guo
    Huang, Tianjing
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2021, 21 (02) : 277 - 291
  • [45] A method for network security risk assessment and decision-making based on the cloud model
    Zhang, Jie
    Tang, Jun
    Pei, Fang
    Journal of Convergence Information Technology, 2012, 7 (06) : 146 - 153
  • [46] An assessment model for cloud service security risk based on entropy and support vector machine
    Jiang, Rong
    Ma, Zifei
    Yang, Juan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21):
  • [47] ArchiMate based Security Risk Assessment as a service: preventing and responding to the cloud of things' risks
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    2019 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2019, : 136 - 140
  • [48] Automation security - Risk assessment - Methods for risk assessment
    Runde, Markus
    Speth, Walter
    Steffen, Thomas
    Thiel, Christoph
    ATP EDITION, 2016, (1-2): : 48 - 55
  • [49] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [50] Areas of Focus for Cloud Security Providers Assessment
    Svata, Vlasta
    Zboril, Martin
    2020 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT), 2020, : 806 - 810