Tarek Ali
Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
Ali, Tarek; Al-Khalidi, Mohammed; Al-Zaidi, Rabab
Authors
Abstract
Cloud computing faces more security threats, requiring better security measures. This paper examines the various classification and categorization schemes for cloud computing security issues, including the widely known CIA trinity (confidentiality, integrity, and availability), by considering critical aspects of the cloud, such as service models, deployment models, and involved parties. A comprehensive comparison of cloud security classifications constructs an exhaustive taxonomy. ISO27005, NIST SP 800–30, CRAMM, CORAS, OCTAVE Allegro, and COBIT 5 are rigorously compared based on their applicability, adaptability, and suitability within a cloud-based hosting methodology. The findings of this research recommend OCTAVE Allegro as the preferred cloud hosting paradigm. With many security models available in management studies, it is imperative to identify those suitable for the rapidly expanding and dynamically evolving cloud environment. This study underscores the significant methods for securing data on cloud-hosting platforms, thereby contributing to establishing a robust cloud security taxonomy and hosting methodology.
Citation
Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (in press). Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review. Journal of Computer Information Systems, 1-28. https://doi.org/10.1080/08874417.2024.2329985
Journal Article Type | Article |
---|---|
Acceptance Date | Mar 5, 2024 |
Online Publication Date | Mar 29, 2024 |
Deposit Date | Apr 23, 2024 |
Publicly Available Date | Apr 23, 2024 |
Journal | Journal of Computer Information Systems |
Print ISSN | 0887-4417 |
Publisher | Taylor and Francis |
Peer Reviewed | Peer Reviewed |
Pages | 1-28 |
DOI | https://doi.org/10.1080/08874417.2024.2329985 |
Keywords | Computer Networks and Communications, Education, Information Systems |
Files
Published Version
(6.1 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study
(2023)
Journal Article
Global IoT Mobility: A Path Based Forwarding Approach
(2022)
Journal Article
Building Novel VHF-Based Wireless Sensor Networks for the Internet of Marine Things
(2018)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search