Abstract | ||
---|---|---|
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider client-specific security requirements. This results into unrealistic and inaccurate security risk evaluation. In this paper, we describe the detailed design and implementation of a security risk assessment tool. The tool supports a threat-specific method to security risk evaluation. The threat-specific method enables Cloud Providers to evaluate the security risk of their tenants based tenant-specific threats as dictated by their particular security requirements. Evaluation shows that the tool is highly usable, but lacks in scaleability. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1109/ICIoT48696.2020.9089459 | 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) |
Keywords | DocType | ISBN |
Cloud computing,vulnerability,security risk,risk assessment,security threats,security objectives,domain model,use cases,class diagrams | Conference | 978-1-7281-4822-9 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Armstrong Nhlabatsi | 1 | 25 | 5.65 |
Alaa Hussein | 2 | 3 | 1.07 |
Noora Fetais | 3 | 3 | 2.76 |
Khaled M. Khan | 4 | 295 | 29.63 |