Risk Management on the Security Problem in Cloud Computing

Author(s):  
Shigeaki Tanimoto ◽  
Manami Hiramoto ◽  
Motoi Iwashita ◽  
Hiroyuki Sato ◽  
Atsushi Kanai
Author(s):  
Kashif Kifayat ◽  
Thar Baker Shamsa ◽  
Michael Mackay ◽  
Madjid Merabti ◽  
Qi Shi

The rise of Cloud Computing represents one of the most significant shifts in Information technology in the last 5 years and promises to revolutionise how we view the availability and consumption of computing storage and processing resources. However, it is well-known that along with the benefits of Cloud Computing, it also presents a number of security issues that have restricted its deployment to date. This chapter reviews the potential vulnerabilities of Cloud-based architectures and uses this as the foundation to define a set of requirements for reassessing risk management in Cloud Computing. To fulfill these requirements, the authors propose a new scheme for the real-time assessment and auditing of risk in cloud-based applications and explore this with the use case of a triage application.


2018 ◽  
pp. 951-963 ◽  
Author(s):  
Samer Alhawari ◽  
Mufleh Amin AL Jarrah ◽  
Wa'el Hadi

With the significant advances in Information and Communications Technology (ICT) over the last half a century, the Cloud computing paradigm is one of the most discussed topics in the field of ICT today. Additionally, Cloud computing has a critical role in today's business world. Without risk management processes embedded into innovative technology that supports Cloud computing, businesses are setting themselves up for a fall. Hence, in this paper, the authors propose a conceptual model of implementing risk management processes into a Cloud computing environment. It highlights the different processes of risk management (risk identification, risk analysis, risk planning, risk execution, and risk monitoring) and how their existence can affect the Cloud environment to ensure proper protection of data and information in order to ensure Cloud networks and connections are secure.


2015 ◽  
Vol 2 (2) ◽  
pp. 14-30 ◽  
Author(s):  
Dothang Truong

Cloud computing has been proven to have numerous benefits for organizations, especially in supply chain management. More and more organizations have adopted cloud-based solutions to be their primary sourcing applications. Nevertheless, this technology is not without challenges, and in order to deploy and implement cloud-based solutions successfully with minimal risks organizations need to have practical guidance on this emerging technology. Despite the rapid growth of cloud computing in supply chain areas, the existing literature is still conceptual, inadequate, and mainly focused on the pre-adoption stage of this technology. This research examines the post-adoption stage of cloud-based supply chain solutions from the decision science perspective and intends to provide organizations with practical guidance on how to ensure the efficiency of a cloud-based supply chain system and control risks associated with cloud-based solutions.


2014 ◽  
Vol 926-930 ◽  
pp. 2811-2814 ◽  
Author(s):  
Zhi Hong Li

Cloud computing has offered a brand-new perspective to scalable, distributed computing, which allows significant reduction in IT costs and increase in capabilities. At the same time, however, due to the openness of accessible information relying on trust between cloud providers and customers, the problem of data security has been amplified under the cloud model. This paper investigates the security problem and some of the key challenges of implementing security solutions.


2011 ◽  
Vol 341-342 ◽  
pp. 641-645
Author(s):  
Di Liu ◽  
Ying Wang ◽  
Lian Guang Liu

The power grid storm disaster monitoring system involves power system data,geomagnetic data, satellite data and other earth space observation data. To solve such problems as the system's large quantity of data, storage and processing difficulties, using cloud computing in the system is putting forward. The basic concepts and the services of cloud computing are introduced first. From the aspects of the front-end data collection and communication methods to the background software data processing, the GIC (geomagnetically-induced current) monitoring system is showed. Then the issues of the continuous expansion of the system are analyzed in detail. The architecture of the power grid storm disaster monitoring system based on cloud computing is given. Security problem of implementation of the system using cloud computing technology are finally discussed.


2013 ◽  
Vol 321-324 ◽  
pp. 2657-2664
Author(s):  
Fu Xie ◽  
Yun Yun Du

Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.


Sign in / Sign up

Export Citation Format

Share Document