Abstract
Cloud computing is an emerging technological paradigm that offers on-demand, scalable, resources and IT-based solutions without the need to invest in new infrastructure or train new personnel. Cloud computing has faced scrutiny regarding security risks involved with allowing sensitive data to be controlled and handled by third-party, off-site vendors. Many businesses with interest in using cloud services do not have a process to assess cloud providers security. In this paper we categorize cloud computing threats into external threats, guest-to-guest threats and cloud-to-guest threats; discuss the new version of the Consensus Assessments Initiative Questionnaire that was developed by the Cloud Security Alliance; propose a Fuzzy Likert Provider Security Measurement prototype that uses fuzzy logic, Likert scales and decision making technologies to assess the cloud service providers’ security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arbabioon, P., Pilavari, N.: Fuzzy logic cloud computing user’s satisfaction assessment methodology. Rev. Bus. Res. 11, 151 (2011)
Bharadwaj, B.: Development of a fuzzy likert scale for the who ICF to include categorical definitions on the bases of a continuum. Master’s thesis, Wayne State University (2007)
Cloud security alliance: consensus assessments initiative questionnaire v3.0.1. https://cloudsecurityalliance.org/download/consensus-assessments-initiative-questionnaire-v3-0-1/
Davis, M.: Cloud security: verify, don’t trust, informationweek::report. http://reports.informationweek.com/abstract/5/8978/Cloud-Computing/Research-Cloud-Security-Verify-Don’t-Trust.html
Decker, K.: What joni mitchell might say about cloud computing. http://decker.com/blog/2010/05/what-joni-mitchell-might-say-about-cloud-computing/
Gibson, J., Rondeau, R., Eveleigh, D., Qing, T.: Benefits and challenges of three cloud computing service models. In: Fourth International Conference on Computational Aspects of Social Networks (2012)
Hedayatpanah, A.: Fuzzy approach to likert spectrum in classified levels in surveying researches. J. Math. Comput. Sci. 2, 394–401 (2011)
Jamil, D., Zaki, H.: Cloud computing security. Int. J. Eng. Sci. Technol. 3(4), 3478–3483 (2011)
Lee, C.: Fuzzy logic in control systems: fuzzy logic controller. IEEE Trans. Syst. Man Cybern. 20, 404–418 (1990)
Lee, Y., Huang, S.: A new fuzzy concept approach to kano’s model. Expert Syst. Appl. 36, 4479–4484 (2009)
Rivera, J., Yu, H., Williams, K., Zhan, J., Yuan, X.: Assessing the security posture of cloud service providers. In: International Conference on IS Management and Evaluation (2015)
Supriya, M., Venkataramana, L., Sangeeta, K., Patra, G.: Estimating trust value for cloud service providers using fuzzy logic. Int. J. Comput. Appl. 48(19), 28–34 (2012)
Acknowledgments
This work was partially supported by National Science Foundation under the award numbers CNS-0909980 and DUE-1129136.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yu, H., Williams, K., Yuan, X. (2015). Cloud Computing Threats and Provider Security Assessment. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-27161-3_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27160-6
Online ISBN: 978-3-319-27161-3
eBook Packages: Computer ScienceComputer Science (R0)