Traditional security risk assessment methods in cloud computing environment: usability analysis

The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud...

Full description

Saved in:
Bibliographic Details
Main Authors: Albakri, Sameer Hasan, Shanmugam, Bharanidharan, Samy, Ganthan Narayana, Idris, Norbik Bashah, Ahmed, Azuan
Format: Article
Language:English
Published: Penerbit UTM Press 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/55712/1/BharanidharanShanmugam2015_TraditionalSecurityRiskAssessmentMethods.pdf
http://eprints.utm.my/id/eprint/55712/
http://dx.doi.org/10.11113/jt.v73.4197
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.55712
record_format eprints
spelling my.utm.557122017-11-01T04:16:58Z http://eprints.utm.my/id/eprint/55712/ Traditional security risk assessment methods in cloud computing environment: usability analysis Albakri, Sameer Hasan Shanmugam, Bharanidharan Samy, Ganthan Narayana Idris, Norbik Bashah Ahmed, Azuan QA76 Computer software The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments. Penerbit UTM Press 2015 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/55712/1/BharanidharanShanmugam2015_TraditionalSecurityRiskAssessmentMethods.pdf Albakri, Sameer Hasan and Shanmugam, Bharanidharan and Samy, Ganthan Narayana and Idris, Norbik Bashah and Ahmed, Azuan (2015) Traditional security risk assessment methods in cloud computing environment: usability analysis. Jurnal Teknologi, 73 (2). pp. 85-89. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v73.4197 DOI:http://dx.doi.org/10.11113/jt.v73.4197
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Albakri, Sameer Hasan
Shanmugam, Bharanidharan
Samy, Ganthan Narayana
Idris, Norbik Bashah
Ahmed, Azuan
Traditional security risk assessment methods in cloud computing environment: usability analysis
description The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments.
format Article
author Albakri, Sameer Hasan
Shanmugam, Bharanidharan
Samy, Ganthan Narayana
Idris, Norbik Bashah
Ahmed, Azuan
author_facet Albakri, Sameer Hasan
Shanmugam, Bharanidharan
Samy, Ganthan Narayana
Idris, Norbik Bashah
Ahmed, Azuan
author_sort Albakri, Sameer Hasan
title Traditional security risk assessment methods in cloud computing environment: usability analysis
title_short Traditional security risk assessment methods in cloud computing environment: usability analysis
title_full Traditional security risk assessment methods in cloud computing environment: usability analysis
title_fullStr Traditional security risk assessment methods in cloud computing environment: usability analysis
title_full_unstemmed Traditional security risk assessment methods in cloud computing environment: usability analysis
title_sort traditional security risk assessment methods in cloud computing environment: usability analysis
publisher Penerbit UTM Press
publishDate 2015
url http://eprints.utm.my/id/eprint/55712/1/BharanidharanShanmugam2015_TraditionalSecurityRiskAssessmentMethods.pdf
http://eprints.utm.my/id/eprint/55712/
http://dx.doi.org/10.11113/jt.v73.4197
_version_ 1643653878918414336
score 13.211869