Publication: Novel risk assessment method to identify information security threats in cloud computing environment
dc.Conferencecode | 218299 | |
dc.Conferencedate | 23 June 2018 through 24 June 2018 | |
dc.Conferencename | 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 | |
dc.FundingDetails | Universiti Teknologi Malaysia: Q.K130000.2538.14H18 | |
dc.FundingDetails | Acknowledgements. The authors would like to thank Universiti Teknologi Malaysia (UTM) for supporting this work through the Tier 1 GUP Grant Scheme under Grant vote number Q.K130000.2538.14H18. | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Teknologi Malaysia (UTM) | |
dc.contributor.affiliations | Charles Darwin University | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Narayana Samy G. | en_US |
dc.contributor.author | Albakri S.H. | en_US |
dc.contributor.author | Maarop N. | en_US |
dc.contributor.author | Magalingam P. | en_US |
dc.contributor.author | Wong D.H.-T. | en_US |
dc.contributor.author | Shanmugam B. | en_US |
dc.contributor.author | Perumal S. | en_US |
dc.date.accessioned | 2024-05-29T01:57:07Z | |
dc.date.available | 2024-05-29T01:57:07Z | |
dc.date.issued | 2019 | |
dc.description.abstract | Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment. � Springer Nature Switzerland AG 2019. | |
dc.description.nature | Final | en_US |
dc.editor | Mohammed F.Saeed F.Gazem N.Busalim A. | en_US |
dc.identifier.doi | 10.1007/978-3-319-99007-1_53 | |
dc.identifier.epage | 578 | |
dc.identifier.isbn | 9783320000000 | |
dc.identifier.issn | 21945357 | |
dc.identifier.scopus | 2-s2.0-85053886948 | |
dc.identifier.spage | 566 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053886948&doi=10.1007%2f978-3-319-99007-1_53&partnerID=40&md5=a423eb3b94e974f2eddec207335b5dc7 | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9902 | |
dc.identifier.volume | 843 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Springer Verlag | en_US |
dc.relation.ispartof | Advances in Intelligent Systems and Computing | |
dc.source | Scopus | |
dc.subject | Cloud computing security | en_US |
dc.subject | Information security risk assessment method | en_US |
dc.subject | Medical research design and method | en_US |
dc.subject | Bioinformatics | en_US |
dc.subject | Security of data | en_US |
dc.subject | Security systems | en_US |
dc.subject | Soft computing | en_US |
dc.subject | Software as a service (SaaS) | en_US |
dc.subject | Cloud computing environments | en_US |
dc.subject | Cloud computing securities | en_US |
dc.subject | Economic benefits | en_US |
dc.subject | Information security risk assessment | en_US |
dc.subject | Information security threats | en_US |
dc.subject | Medical research | en_US |
dc.subject | Risk assessment methods | en_US |
dc.subject | Security risk assessments | en_US |
dc.subject | Risk assessment | en_US |
dc.title | Novel risk assessment method to identify information security threats in cloud computing environment | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |