Security Risk Assessment of Cloud Computing Services in a Networked Environment

Abstract

Different cloud computing service providers offer their customers' services with different risk levels. The customers wish to minimize their risks for a given expenditure or investment. This paper concentrates on consumers' point of view. Cloud computing services are composed of services organized according to a hierarchy of software application services, beneath them platform services which also use infrastructure services. Providers currently offer software services as bundles which include the software, platform and infrastructure services. Providers also offer platform services bundled with infrastructure services. Bundling services prevent customers from splitting their service purchases between a provider of software and a different provider of the underlying platform or infrastructure. In this paper the underlying assumption is the existence of a free competitive market, in which consumers are free to switch their services among providers. The proposed model is aimed at the potential customer who wishes to compare the risks of cloud service bundles offered by providers. The article identifies the major components of risk in each level of cloud computing services. A computational scheme is offered to assess the overall risk on a common scale.

Authors and Affiliations

Eli WEINTRAUB, Yuval COHEN

Keywords

Related Articles

 Creating a Complete Model of an Intrusion Detection System effective on the LAN

 the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect int...

NFC Technology for Contactless Payment Echosystems

Since the earliest ages, the human being has not ceased to develop its system of exchange of goods. The first system introduced is barter, it has evolved over time into currency by taking various forms (shells, teeth, fe...

An Investigation and Comparison of Invasive Weed, Flower Pollination and Krill Evolutionary Algorithms

Being inspired by natural phenomena and available biological processes in the nature is one of the difficult methods of problem solving in computer sciences. Evolutionary methods are a set of algorithms that are inspired...

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

In this paper, we study the scheduling problem with rejection on two unrelated parallel machines. We may choose to reject some jobs, thus incurring the corresponding penalty. The goal is to minimize the makespan plus the...

Weighted Unsupervised Learning for 3D Object Detection

This paper introduces a novel weighted unsuper-vised learning for object detection using an RGB-D camera. This technique is feasible for detecting the moving objects in the noisy environments that are captured by an RGB-...

Download PDF file
  • EP ID EP359001
  • DOI 10.14569/IJACSA.2016.071112
  • Views 87
  • Downloads 0

How To Cite

Eli WEINTRAUB, Yuval COHEN (2016). Security Risk Assessment of Cloud Computing Services in a Networked Environment. International Journal of Advanced Computer Science & Applications, 7(11), 79-90. https://europub.co.uk/articles/-A-359001