Security and Risk Assessment in the Cloud

被引:5
|
作者
Madria, Sanjay K. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
access control; cloud computing; cloud service providers; CSPs; DaaS; data as a service; data replication; integrity verification; PDP; provable data possession; risk assessment; Secure query processing; security; SQP;
D O I
10.1109/MC.2016.280
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fears about the data security that cloud service providers offer is a primary reason many organizations haven't fully adopted cloud services. Key issues include data storage, data replication, integrity verification, access control, risk assessment, and secure query processing.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [31] Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1084 - 1089
  • [32] Design of basic process of information security risk assessment in cloud computing environment
    Huang, Min
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS AND COMPUTER ENGINEERING (ICCECE), 2021, : 494 - 499
  • [33] A Cooperative Game for Online Cloud Federation Formation based on Security Risk Assessment
    Halabi, Talal
    Bellaiche, Martine
    Abusitta, Adel
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 83 - 88
  • [34] RELATED WORK IN CLOUD SECURITY ASSESSMENT
    不详
    IEEE CLOUD COMPUTING, 2015, 2 (02): : 66 - 66
  • [35] Security Vulnerability Assessment of OpenStack Cloud
    Ristov, Sasko
    Gusev, Marjan
    Donevski, Aleksandar
    2014 SIXTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2014, : 95 - 100
  • [36] SECURITY RISK MANAGEMENT - CLOUD ENVIRONMENT
    Zboril, Martin
    STRATEGIC MODELING IN MANAGEMENT, ECONOMY AND SOCIETY (IDIMT-2018), 2018, 47 : 367 - 374
  • [37] Study on Cloud Security Risk and Remedy
    Aich, Asish
    Sen, Alo
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (02): : 155 - 165
  • [38] Risk Propagation of Security SLAs in the Cloud
    Hale, Matthew L.
    Gamble, Rose
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 730 - 735
  • [39] Privacy Risk, Security, Accountability in the Cloud
    Theoharidou, Marianthi
    Papanikolaou, Nick
    Pearson, Siani
    Gritzalis, Dimitris
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 177 - 184
  • [40] Cyber Security Risk Assessment on Industry 4.0 using ICS testbed with AI and Cloud
    Matsuda, Wataru
    Fujimoto, Mariko
    Aoyama, Tomomi
    Mitsunaga, Takuho
    2019 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2019, : 54 - 59