A Security Threats Measurement Model for Reducing Cloud Computing Security Risk

被引:3
作者
Lai, Sen-Tarng [1 ]
Leu, Fang-Yie [2 ]
机构
[1] Shih Chien Univ, Dept Informat Technol & Management, Taipei 10462, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
来源
2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015 | 2015年
关键词
cloud computing; security threats measurement; security factors; evaluation procedure; service provider;
D O I
10.1109/IMIS.2015.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the trend of information resources sharing and also an important tool for enterprises or organizations to enhance competitiveness. Users have the flexibility to adjust request and configuration. However, network security and resource sharing issues have continued to threaten the operation of cloud computing, making cloud computing security encounter serious test. How to evaluate cloud computing security has become a topic worthy of further exploration. Combining system, management and technique three levels security factors, this paper proposes a Security Threats Measurement Model (STMM). Applying the STMM, security of cloud computing system environment can be effectively evaluated and cloud computing security defects and problems can be concretely identified. Based on the evaluation results, the user can choice the higher security service provider or request the service provider security improvement actions.
引用
收藏
页码:414 / 419
页数:6
相关论文
共 16 条
[1]  
[Anonymous], NIST SPECIAL PUBLICA
[2]  
[Anonymous], 2013, CLOUD COMP FOR SUMM
[3]  
[Anonymous], 2010, Top Threats to Cloud Computing V1.0
[4]  
[Anonymous], 1981, Software Engineering Economics
[5]  
Binning David, 2009, COMPUTER WEEKLY
[6]  
Bisong A., 2011, International Journal of Network Security and Its Application (IJNSA), V3, P30, DOI DOI 10.5121/IJNSA.2011.3103
[7]  
Brodkin J., 2008, INFOWORLD
[8]   Cloud Computing Security [J].
Carlin, Sean ;
Curran, Kevin .
INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) :14-19
[9]  
Conte S.D., 1986, Software Engineering Metrics and Models
[10]  
Eloff M. M., 2010, P IEEE INT C INF SEC