Tarek Ali
Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
Ali, Tarek; Al-Khalidi, Mohammed; Al-Zaidi, Rabab
Authors
Abstract
Cloud computing faces more security threats, requiring better security measures. This paper examines the various classification and categorization schemes for cloud computing security issues, including the widely known CIA trinity (confidentiality, integrity, and availability), by considering critical aspects of the cloud, such as service models, deployment models, and involved parties. A comprehensive comparison of cloud security classifications constructs an exhaustive taxonomy. ISO27005, NIST SP 800–30, CRAMM, CORAS, OCTAVE Allegro, and COBIT 5 are rigorously compared based on their applicability, adaptability, and suitability within a cloud-based hosting methodology. The findings of this research recommend OCTAVE Allegro as the preferred cloud hosting paradigm. With many security models available in management studies, it is imperative to identify those suitable for the rapidly expanding and dynamically evolving cloud environment. This study underscores the significant methods for securing data on cloud-hosting platforms, thereby contributing to establishing a robust cloud security taxonomy and hosting methodology.
Citation
Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (in press). Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review. Journal of Computer Information Systems, 1-28. https://doi.org/10.1080/08874417.2024.2329985
Journal Article Type | Article |
---|---|
Acceptance Date | Mar 5, 2024 |
Online Publication Date | Mar 29, 2024 |
Deposit Date | Apr 23, 2024 |
Publicly Available Date | Apr 23, 2024 |
Journal | Journal of Computer Information Systems |
Print ISSN | 0887-4417 |
Publisher | Taylor and Francis |
Peer Reviewed | Peer Reviewed |
Pages | 1-28 |
DOI | https://doi.org/10.1080/08874417.2024.2329985 |
Keywords | Computer Networks and Communications, Education, Information Systems |
Files
Published Version
(6.1 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
An Optimized Field Programmable Gate Array Based Noise Reduction Techniques for Fetal Electrocardiogram Signal Processing
(2024)
Presentation / Conference Contribution
Securing the Metaverse: A Deep Reinforcement Learning and Generative Adversarial Network Approach to Intrusion Detection
(2024)
Presentation / Conference Contribution