Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment

Ganthan Narayana Samy, Sameer Hasan Albakri, Nurazean Maarop, Pritheega Magalingam, Doris Hooi Ten Wong, Bharanidharan Shanmugam, Sundresan Perumal

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Abstract

Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.

Original languageEnglish
Title of host publicationIRICT 2018: Recent Trends in Data Science and Soft Computing
Subtitle of host publicationProceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018)
EditorsFaisal Saeed, Nadhmi Gazem, Fathey Mohammed, Abdelsalam Busalim
Place of PublicationCham, Switzerland
PublisherSpringer, Cham
Pages566-578
Number of pages13
ISBN (Electronic)9783319990071
ISBN (Print)9783319990064
DOIs
Publication statusPublished - 2019
Event3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia
Duration: 23 Jun 201824 Jun 2018

Publication series

NameAdvances in Intelligent Systems and Computing
PublisherSpringer
Volume843
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
CountryMalaysia
CityKuala Lumpur
Period23/06/1824/06/18

Fingerprint

Security of data
Cloud computing
Risk assessment
Economics

Cite this

Narayana Samy, G., Albakri, S. H., Maarop, N., Magalingam, P., Wong, D. H. T., Shanmugam, B., & Perumal, S. (2019). Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment. In F. Saeed, N. Gazem, F. Mohammed, & A. Busalim (Eds.), IRICT 2018: Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018) (pp. 566-578). (Advances in Intelligent Systems and Computing; Vol. 843). Cham, Switzerland: Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_53
Narayana Samy, Ganthan ; Albakri, Sameer Hasan ; Maarop, Nurazean ; Magalingam, Pritheega ; Wong, Doris Hooi Ten ; Shanmugam, Bharanidharan ; Perumal, Sundresan. / Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment. IRICT 2018: Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018). editor / Faisal Saeed ; Nadhmi Gazem ; Fathey Mohammed ; Abdelsalam Busalim. Cham, Switzerland : Springer, Cham, 2019. pp. 566-578 (Advances in Intelligent Systems and Computing).
@inbook{f7373870cf764e6d8f050172adfc7aa4,
title = "Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment",
abstract = "Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.",
keywords = "Cloud computing security, Information security risk assessment method, Medical research design and method",
author = "{Narayana Samy}, Ganthan and Albakri, {Sameer Hasan} and Nurazean Maarop and Pritheega Magalingam and Wong, {Doris Hooi Ten} and Bharanidharan Shanmugam and Sundresan Perumal",
year = "2019",
doi = "10.1007/978-3-319-99007-1_53",
language = "English",
isbn = "9783319990064",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer, Cham",
pages = "566--578",
editor = "Saeed, {Faisal } and Gazem, {Nadhmi } and Mohammed, {Fathey } and Busalim, {Abdelsalam }",
booktitle = "IRICT 2018: Recent Trends in Data Science and Soft Computing",

}

Narayana Samy, G, Albakri, SH, Maarop, N, Magalingam, P, Wong, DHT, Shanmugam, B & Perumal, S 2019, Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment. in F Saeed, N Gazem, F Mohammed & A Busalim (eds), IRICT 2018: Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018). Advances in Intelligent Systems and Computing, vol. 843, Springer, Cham, Cham, Switzerland, pp. 566-578, 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018, Kuala Lumpur, Malaysia, 23/06/18. https://doi.org/10.1007/978-3-319-99007-1_53

Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment. / Narayana Samy, Ganthan; Albakri, Sameer Hasan; Maarop, Nurazean; Magalingam, Pritheega; Wong, Doris Hooi Ten; Shanmugam, Bharanidharan; Perumal, Sundresan.

IRICT 2018: Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018). ed. / Faisal Saeed; Nadhmi Gazem; Fathey Mohammed; Abdelsalam Busalim. Cham, Switzerland : Springer, Cham, 2019. p. 566-578 (Advances in Intelligent Systems and Computing; Vol. 843).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

TY - CHAP

T1 - Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment

AU - Narayana Samy, Ganthan

AU - Albakri, Sameer Hasan

AU - Maarop, Nurazean

AU - Magalingam, Pritheega

AU - Wong, Doris Hooi Ten

AU - Shanmugam, Bharanidharan

AU - Perumal, Sundresan

PY - 2019

Y1 - 2019

N2 - Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.

AB - Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.

KW - Cloud computing security

KW - Information security risk assessment method

KW - Medical research design and method

UR - http://www.scopus.com/inward/record.url?scp=85053886948&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-99007-1_53

DO - 10.1007/978-3-319-99007-1_53

M3 - Chapter

SN - 9783319990064

T3 - Advances in Intelligent Systems and Computing

SP - 566

EP - 578

BT - IRICT 2018: Recent Trends in Data Science and Soft Computing

A2 - Saeed, Faisal

A2 - Gazem, Nadhmi

A2 - Mohammed, Fathey

A2 - Busalim, Abdelsalam

PB - Springer, Cham

CY - Cham, Switzerland

ER -

Narayana Samy G, Albakri SH, Maarop N, Magalingam P, Wong DHT, Shanmugam B et al. Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment. In Saeed F, Gazem N, Mohammed F, Busalim A, editors, IRICT 2018: Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018). Cham, Switzerland: Springer, Cham. 2019. p. 566-578. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-99007-1_53