Publication:
Novel risk assessment method to identify information security threats in cloud computing environment

dc.Conferencecode218299
dc.Conferencedate23 June 2018 through 24 June 2018
dc.Conferencename3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
dc.FundingDetailsUniversiti Teknologi Malaysia: Q.K130000.2538.14H18
dc.FundingDetailsAcknowledgements. The authors would like to thank Universiti Teknologi Malaysia (UTM) for supporting this work through the Tier 1 GUP Grant Scheme under Grant vote number Q.K130000.2538.14H18.
dc.contributor.affiliationsFaculty of Science and Technology
dc.contributor.affiliationsUniversiti Teknologi Malaysia (UTM)
dc.contributor.affiliationsCharles Darwin University
dc.contributor.affiliationsUniversiti Sains Islam Malaysia (USIM)
dc.contributor.authorNarayana Samy G.en_US
dc.contributor.authorAlbakri S.H.en_US
dc.contributor.authorMaarop N.en_US
dc.contributor.authorMagalingam P.en_US
dc.contributor.authorWong D.H.-T.en_US
dc.contributor.authorShanmugam B.en_US
dc.contributor.authorPerumal S.en_US
dc.date.accessioned2024-05-29T01:57:07Z
dc.date.available2024-05-29T01:57:07Z
dc.date.issued2019
dc.description.abstractCloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment. � Springer Nature Switzerland AG 2019.
dc.description.natureFinalen_US
dc.editorMohammed F.Saeed F.Gazem N.Busalim A.en_US
dc.identifier.doi10.1007/978-3-319-99007-1_53
dc.identifier.epage578
dc.identifier.isbn9783320000000
dc.identifier.issn21945357
dc.identifier.scopus2-s2.0-85053886948
dc.identifier.spage566
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85053886948&doi=10.1007%2f978-3-319-99007-1_53&partnerID=40&md5=a423eb3b94e974f2eddec207335b5dc7
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/9902
dc.identifier.volume843
dc.languageEnglish
dc.language.isoen_US
dc.publisherSpringer Verlagen_US
dc.relation.ispartofAdvances in Intelligent Systems and Computing
dc.sourceScopus
dc.subjectCloud computing securityen_US
dc.subjectInformation security risk assessment methoden_US
dc.subjectMedical research design and methoden_US
dc.subjectBioinformaticsen_US
dc.subjectSecurity of dataen_US
dc.subjectSecurity systemsen_US
dc.subjectSoft computingen_US
dc.subjectSoftware as a service (SaaS)en_US
dc.subjectCloud computing environmentsen_US
dc.subjectCloud computing securitiesen_US
dc.subjectEconomic benefitsen_US
dc.subjectInformation security risk assessmenten_US
dc.subjectInformation security threatsen_US
dc.subjectMedical researchen_US
dc.subjectRisk assessment methodsen_US
dc.subjectSecurity risk assessmentsen_US
dc.subjectRisk assessmenten_US
dc.titleNovel risk assessment method to identify information security threats in cloud computing environment
dc.typeConference Paperen_US
dspace.entity.typePublication

Files

Collections