Mitigating Threats and Security Metrics in Cloud Computing

نویسندگان

  • Jayaprakash Kar
  • Manoj Ranjan Mishra
چکیده

Cloud computing is a distributed computing model that still faces problems. Many new innovative and emerge technique to take advantage of its features and among the research challenges found in the cloud. In this article, we explore the security threats and Risk Assessment to Cloud Computing, attack mitigation framework and the risk-based dynamic access control for cloud computing. Common security threats to Cloud Computing are explored and these threats are addressed through acceptable measures through governance and effective risk management using a tailored Security Risk Approach (SRA). Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. Also, the present study proposes an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

Towards Information Security Metrics Framework for Cloud Computing

Received Sept 05 th , 2012 Accepted Aug 26 th , 2012 Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet. Cost and security are influential issues to deploy cloud computing in large enterprise. Privacy and security are very important issues in terms of user trust and legal compliance. Information...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JIPS

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2016