Mitigating Threats and Security Metrics in Cloud Computing

Jayaprakash Kar and Manoj Ranjan Mishra
Volume: 12, No: 2, Page: 226 ~ 233, Year: 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Full Text:

Abstract
Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Jayaprakash Kar and Manoj Ranjan Mishra, "Mitigating Threats and Security Metrics in Cloud Computing," Journal of Information Processing Systems, vol. 12, no. 2, pp. 226~233, 2016. DOI: 10.3745/JIPS.03.0049.

ACM Style
Jayaprakash Kar and Manoj Ranjan Mishra, "Mitigating Threats and Security Metrics in Cloud Computing," Journal of Information Processing Systems, 12, 2, (2016), 226~233. DOI: 10.3745/JIPS.03.0049.