TY - GEN
T1 - Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment
AU - Narayana Samy, Ganthan
AU - Albakri, Sameer Hasan
AU - Maarop, Nurazean
AU - Magalingam, Pritheega
AU - Wong, Doris Hooi Ten
AU - Shanmugam, Bharanidharan
AU - Perumal, Sundresan
PY - 2019
Y1 - 2019
N2 - Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.
AB - Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.
KW - Cloud computing security
KW - Information security risk assessment method
KW - Medical research design and method
UR - http://www.scopus.com/inward/record.url?scp=85053886948&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-99007-1_53
DO - 10.1007/978-3-319-99007-1_53
M3 - Conference Paper published in Proceedings
AN - SCOPUS:85053886948
SN - 9783319990064
T3 - Advances in Intelligent Systems and Computing
SP - 566
EP - 578
BT - Recent Trends in Data Science and Soft Computing
A2 - Saeed, Faisal
A2 - Gazem, Nadhmi
A2 - Mohammed, Fathey
A2 - Busalim, Abdelsalam
PB - Springer, Cham
CY - Cham, Switzerland
T2 - 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
Y2 - 23 June 2018 through 24 June 2018
ER -