A cybersecurity model in cloud computing environments

被引:46
|
作者
Rabai, Latifa Ben Arfa [1 ]
Jouini, Mouna [1 ]
Ben Aissa, Anis [2 ]
Mili, Ali [3 ]
机构
[1] ISG, Tunis, Tunisia
[2] ENIT, Tunis, Tunisia
[3] NJIT, Newark, NJ USA
关键词
Cloud computing; Cyber security; Mean failure cost; Security requirements; Security threats;
D O I
10.1016/j.jksuci.2012.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an emerging paradigm of computing that replaces computing as a personal commodity by computing as a public utility. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, convenience but it raises major issues, not least of which are: loss of control and loss of security. In this paper, we explore a user-centered measure of cyber-security, and see how this measure can be used to analyze cloud computing as a business model. (C) 2012 King Saud University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:63 / 75
页数:13
相关论文
共 50 条
  • [31] Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism
    Altowaijri, Saleh M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 1 - 10
  • [32] Local Databases or Cloud Computing Services: Cybersecurity Issues at the NUST, Zimbabwe
    Mthwazi, Guidance
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 231 - 239
  • [33] Employing Augmented Reality for Cybersecurity Operations in High Performance Computing Environments
    Sukhija, Nitin
    Haser, Cory
    Bautista, Elizabeth
    PEARC '19: PROCEEDINGS OF THE PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING ON RISE OF THE MACHINES (LEARNING), 2019,
  • [34] Migration Patterns for Applications in Cloud Computing Environments
    Pohl, Matthias
    Babel, Alexander
    Staegemann, Daniel
    Haertel, Christian
    Kharitonov, Andrey
    Nahhas, Abdulrahman
    Turowski, Klaus
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2022, VOL. 3, 2023, 464 : 621 - 630
  • [35] Brokering in interconnected cloud computing environments: A survey
    Chauhan, Sameer Singh
    Pilli, Emmanuel S.
    Joshi, R. C.
    Singh, Girdhari
    Govil, M. C.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 133 : 193 - 209
  • [36] Logging System for Cloud Computing Forensic Environments
    Pitrascu, Alecsandru
    Patriciu, Victor-Valeriu
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2014, 16 (01): : 80 - 88
  • [37] A Security Framework for Secure Cloud Computing Environments
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) : 32 - 44
  • [38] Logging Framework for Cloud Computing Forensic Environments
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [39] Reactive performance monitoring of Cloud computing environments
    Afef Mdhaffar
    Riadh Ben Halima
    Mohamed Jmaiel
    Bernd Freisleben
    Cluster Computing, 2017, 20 : 2465 - 2477
  • [40] Investigating the Features of Research Environments on Cloud Computing
    Safvati, Mohammad Ali
    Sharzehei, Mahmoud
    Mesbahi, Mohammad Reza
    2017 IEEE 4TH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2017, : 404 - 411