Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment

Author(s):  
Ganthan Narayana Samy ◽  
Sameer Hasan Albakri ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Doris Hooi-Ten Wong ◽  
...  
2018 ◽  
Vol 24 (1) ◽  
pp. 739-743 ◽  
Author(s):  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Sundresan Perumal ◽  
...  

2013 ◽  
Vol 10 (1) ◽  
pp. 1186-1191 ◽  
Author(s):  
Sasan Karamizadeh ◽  
Jafar Shayan ◽  
Mojtaba Alizadeh ◽  
Atabak Kheirkhah

Cloud computing has changed the whole picture that distributed computing used to present such as  Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. These security threats must be overcome in order to get full benefit from this new computing exemplar. This paper identifies the importance of awareness behaviour in context of information security for cloud. We investigate four important factors of security awareness behaviour that should be considered when organisations intend to improve their security toward cloud computing environment based on awareness-focused programs. Finally we conclude that a well-structured awareness program that positively affect the level of self-efficacy, security practice care behaviour, security awareness technology behaviour and intention will improve the level of total information security in cloud computing environment


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


Sign in / Sign up

Export Citation Format

Share Document