Traditional security risk assessment methods in cloud computing environment: usability analysis
The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/55712/1/BharanidharanShanmugam2015_TraditionalSecurityRiskAssessmentMethods.pdf http://eprints.utm.my/id/eprint/55712/ http://dx.doi.org/10.11113/jt.v73.4197 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.55712 |
---|---|
record_format |
eprints |
spelling |
my.utm.557122017-11-01T04:16:58Z http://eprints.utm.my/id/eprint/55712/ Traditional security risk assessment methods in cloud computing environment: usability analysis Albakri, Sameer Hasan Shanmugam, Bharanidharan Samy, Ganthan Narayana Idris, Norbik Bashah Ahmed, Azuan QA76 Computer software The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments. Penerbit UTM Press 2015 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/55712/1/BharanidharanShanmugam2015_TraditionalSecurityRiskAssessmentMethods.pdf Albakri, Sameer Hasan and Shanmugam, Bharanidharan and Samy, Ganthan Narayana and Idris, Norbik Bashah and Ahmed, Azuan (2015) Traditional security risk assessment methods in cloud computing environment: usability analysis. Jurnal Teknologi, 73 (2). pp. 85-89. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v73.4197 DOI:http://dx.doi.org/10.11113/jt.v73.4197 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Albakri, Sameer Hasan Shanmugam, Bharanidharan Samy, Ganthan Narayana Idris, Norbik Bashah Ahmed, Azuan Traditional security risk assessment methods in cloud computing environment: usability analysis |
description |
The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments. |
format |
Article |
author |
Albakri, Sameer Hasan Shanmugam, Bharanidharan Samy, Ganthan Narayana Idris, Norbik Bashah Ahmed, Azuan |
author_facet |
Albakri, Sameer Hasan Shanmugam, Bharanidharan Samy, Ganthan Narayana Idris, Norbik Bashah Ahmed, Azuan |
author_sort |
Albakri, Sameer Hasan |
title |
Traditional security risk assessment methods in cloud computing environment: usability analysis |
title_short |
Traditional security risk assessment methods in cloud computing environment: usability analysis |
title_full |
Traditional security risk assessment methods in cloud computing environment: usability analysis |
title_fullStr |
Traditional security risk assessment methods in cloud computing environment: usability analysis |
title_full_unstemmed |
Traditional security risk assessment methods in cloud computing environment: usability analysis |
title_sort |
traditional security risk assessment methods in cloud computing environment: usability analysis |
publisher |
Penerbit UTM Press |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/55712/1/BharanidharanShanmugam2015_TraditionalSecurityRiskAssessmentMethods.pdf http://eprints.utm.my/id/eprint/55712/ http://dx.doi.org/10.11113/jt.v73.4197 |
_version_ |
1643653878918414336 |
score |
13.211869 |