Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment

Ganthan Narayana Samy, Sameer Hasan Albakri, Nurazean Maarop, Pritheega Magalingam, Doris Hooi Ten Wong, Bharanidharan Shanmugam, Sundresan Perumal

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.

Original languageEnglish
Title of host publicationIRICT 2018: Recent Trends in Data Science and Soft Computing
Subtitle of host publicationProceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018)
EditorsFaisal Saeed, Nadhmi Gazem, Fathey Mohammed, Abdelsalam Busalim
Place of PublicationCham, Switzerland
PublisherSpringer, Cham
Pages566-578
Number of pages13
ISBN (Electronic)9783319990071
ISBN (Print)9783319990064
DOIs
Publication statusPublished - 2019
Event3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia
Duration: 23 Jun 201824 Jun 2018

Publication series

NameAdvances in Intelligent Systems and Computing
PublisherSpringer
Volume843
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
CountryMalaysia
CityKuala Lumpur
Period23/06/1824/06/18

Fingerprint Dive into the research topics of 'Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment'. Together they form a unique fingerprint.

  • Cite this

    Narayana Samy, G., Albakri, S. H., Maarop, N., Magalingam, P., Wong, D. H. T., Shanmugam, B., & Perumal, S. (2019). Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment. In F. Saeed, N. Gazem, F. Mohammed, & A. Busalim (Eds.), IRICT 2018: Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018) (pp. 566-578). (Advances in Intelligent Systems and Computing; Vol. 843). Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_53