Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method

Ganthan Narayana Samy, Bharanidharan Shanmugam, Nurazean Maarop, Pritheega Magalingam, Sundresan Perumal, Sameer Hasan Albakri, Rabiah Ahmad

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Abstract

The traditional risk assessment methods calculate the risk based on the risk likelihood and the risk impact, which are not suitable to be applied in cloud computing environments. Therefore, this study proposes a framework to assess information security risk by using international risk management standard with adoptions of a medical research design and method. The risk management standard is based on BS.ISO/IEC27005:2011, which consists of context establishment, risk identification, risk analysis, risk evaluation, risk treatment, monitoring and review, and communication and consultation. Adopting a retrospective cohort study and a method known as Cox Proportional Hazards (PH) Model under survival analysis method will be applied to identify potential information security threats in cloud computing environments. The survival analysis method is used to identify which factors have significant impact and predict the hazard probabilities for selected risk factors in medical field. The proposed framework will be used software as a service model of cloud computing. Therefore, the contribution of this research will be a framework for performing risk analysis studies to identify information security threats in cloud computing environment using medical research design and method.
Original languageEnglish
Title of host publicationAdvanced Science Letters
PublisherAmerican Scientific Publishers
Pages739-743
Number of pages5
Volume24
Edition1
DOIs
Publication statusPublished - Jan 2018

Fingerprint Dive into the research topics of 'Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method'. Together they form a unique fingerprint.

  • Cite this

    Narayana Samy, G., Shanmugam, B., Maarop, N., Magalingam, P., Perumal, S., Albakri, S. H., & Ahmad, R. (2018). Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method. In Advanced Science Letters (1 ed., Vol. 24, pp. 739-743). American Scientific Publishers. https://doi.org/10.1166/asl.2018.11804