A cybersecurity model in cloud computing environments

被引:46
|
作者
Rabai, Latifa Ben Arfa [1 ]
Jouini, Mouna [1 ]
Ben Aissa, Anis [2 ]
Mili, Ali [3 ]
机构
[1] ISG, Tunis, Tunisia
[2] ENIT, Tunis, Tunisia
[3] NJIT, Newark, NJ USA
关键词
Cloud computing; Cyber security; Mean failure cost; Security requirements; Security threats;
D O I
10.1016/j.jksuci.2012.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an emerging paradigm of computing that replaces computing as a personal commodity by computing as a public utility. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, convenience but it raises major issues, not least of which are: loss of control and loss of security. In this paper, we explore a user-centered measure of cyber-security, and see how this measure can be used to analyze cloud computing as a business model. (C) 2012 King Saud University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:63 / 75
页数:13
相关论文
共 50 条
  • [41] Reactive performance monitoring of Cloud computing environments
    Mdhaffar, Afef
    Ben Halima, Riadh
    Jmaiel, Mohamed
    Freisleben, Bernd
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2465 - 2477
  • [42] Survivable zero trust for cloud computing environments
    Ferretti, Luca
    Magnanini, Federico
    Andreolini, Mauro
    Colajanni, Michele
    COMPUTERS & SECURITY, 2021, 110
  • [43] Establishing Trust in Hybrid Cloud Computing Environments
    Abawajy, Jemal
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 118 - 125
  • [44] Evaluation of Monitoring Tools for Cloud Computing Environments
    Sandoval, Yosandra
    Gallizo, Georgina
    Curiel, Mariela
    2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,
  • [45] Resource Monitoring and Prediction in Cloud Computing Environments
    Chen, Hanxiong
    Fu, Xiong
    Tang, Zhongrui
    Zhu, Xinxin
    3RD INTERNATIONAL CONFERENCE ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY (ACIT 2015) 2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND INTELLIGENCE (CSI 2015), 2015, : 288 - 292
  • [46] Agreement technologies and their use in cloud computing environments
    Heras, Stella
    De la Prieta, Fernando
    Julian, Vicente
    Rodriguez, Sara
    Botti, Vicente
    Bajo, Javier
    Corchado, Juan M.
    PROGRESS IN ARTIFICIAL INTELLIGENCE, 2012, 1 (04) : 277 - 290
  • [47] Big Data Processing in Cloud Computing Environments
    Noraziah, A.
    Fakherldin, Mohammed Adam Ibrahim
    Adam, Khalid
    Majid, Mazlina Abdul
    ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11092 - 11095
  • [48] Efficient Service Discovery for Cloud Computing Environments
    Chen, Fei
    Bai, Xiaoli
    Liu, Bingbing
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 443 - 448
  • [49] Security and Privacy Challenges in Cloud Computing Environments
    Takabi, Hassan
    Joshi, James B. D.
    Ahn, Gail-Joon
    IEEE SECURITY & PRIVACY, 2010, 8 (06) : 24 - 31
  • [50] Big Data Processing in Cloud Computing Environments
    Ji, Changqing
    Li, Yu
    Qiu, Wenming
    Awada, Uchechukwu
    Li, Keqiu
    PROCEEDINGS OF THE 2012 12TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (I-SPAN 2012), 2012, : 17 - 23