A Security Framework for Secure Cloud Computing Environments

2019 ◽  
pp. 249-263 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.

Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact security presents a major obstacle in cloud computing adoption. In this chapter, we will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, we present first a deep analysis of security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2016 ◽  
Vol 6 (3) ◽  
pp. 32-44 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2018 ◽  
pp. 926-952 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact security presents a major obstacle in cloud computing adoption. In this chapter, we will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, we present first a deep analysis of security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2019 ◽  
pp. 211-225
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

The recent emergence of cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery, and development models. Projecting as an evolutionary step, cloud computing encompasses elements from grid computing, utility computing, and autonomic computing into an innovative deployment architecture. Cloud computing systems offer a lot of advantages like pay per use and rapid service provisioned on demand, while it suffers for some concerns specially security. In fact, a number of unchartered risks and challenges have been introduced from this new environment. This chapter explores the security issues in cloud computing systems and shows how to solve these problems using a quantitative security risk assessment model.


2014 ◽  
Vol 7 (11) ◽  
pp. 2114-2124 ◽  
Author(s):  
Sameer Hasan Albakri ◽  
Bharanidharan Shanmugam ◽  
Ganthan Narayana Samy ◽  
Norbik Bashah Idris ◽  
Azuan Ahmed

2016 ◽  
pp. 307-334 ◽  
Author(s):  
Ishan Senarathna ◽  
Matthew Warren ◽  
William Yeoh ◽  
Scott Salzman

Cloud Computing is an increasingly important worldwide development in business service provision. The business benefits of Cloud Computing usage include reduced IT overhead costs, greater flexibility of services, reduced TCO (Total Cost of Ownership), on-demand services, and improved productivity. As a result, Small and Medium-Sized Enterprises (SMEs) are increasingly adopting Cloud Computing technology because of these perceived benefits. The most economical deployment model in Cloud Computing is called the Public Cloud, which is especially suitable for SMEs because it provides almost immediate access to hardware resources and reduces their need to purchase an array of advanced hardware and software applications. The changes experienced in Cloud Computing adoption over the past decade are unprecedented and have raised important issues with regard to privacy, security, trust, and reliability. This chapter presents a conceptual model for Cloud Computing adoption by SMEs in Australia.


Author(s):  
Advokat Lars Perhard

Cloud Sweden is a story about how a group of experienced IT-people from different sectors of the industry came together and discussed a relatively new phenomenon called the Cloud; or what is today labelled as Cloud computing. And they realised there was a tremendous momentum and potential prosperity connected to it. They also concluded that in order to support potential users and to promote Sweden as an IT-oriented country in the forefront of the development there was a need for information – organisations considering migrating their IT functions to the Cloud should at least be able to make an informed decision. There are significant advantages with this new technology, but also a number of pitfalls that any user should be aware of. There were for example critical security issues at hand before when the servers were placed within the four walls of the office and there still are critical security issues relating to the Cloud. However, the issues to solve are different. Cloud Sweden was founded and the different branches of the group have produced a number of documents published on its website. Cloud Sweden has apart from a number of members working actively in the steering and competence groups several thousand members from the industry in a Linkedin network. In this article you will find a sample of what the legal group of Cloud Sweden has produced – a primer of legal issues that a migrant shall pay attention to before the leap into the Cloud. 


Sign in / Sign up

Export Citation Format

Share Document