Traditional security risk assessment methods in cloud computing environment: Usability analysis

S.H. Albakri, B. Shanmugam, Ganthan Narayana Samy, N.B. Idris, A. Ahmed

Research output: Contribution to journalArticle

110 Downloads (Pure)

Abstract

The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments. © 2015 Penerbit UTM Press. All rights reserved.
Original languageEnglish
Pages (from-to)85-89
Number of pages5
JournalJurnal Teknologi
Volume73
Issue number2
Publication statusPublished - 2015
Externally publishedYes

Fingerprint Dive into the research topics of 'Traditional security risk assessment methods in cloud computing environment: Usability analysis'. Together they form a unique fingerprint.

  • Cite this