Skip to main content

Cloud Computing Threats and Provider Security Assessment

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

Abstract

Cloud computing is an emerging technological paradigm that offers on-demand, scalable, resources and IT-based solutions without the need to invest in new infrastructure or train new personnel. Cloud computing has faced scrutiny regarding security risks involved with allowing sensitive data to be controlled and handled by third-party, off-site vendors. Many businesses with interest in using cloud services do not have a process to assess cloud providers security. In this paper we categorize cloud computing threats into external threats, guest-to-guest threats and cloud-to-guest threats; discuss the new version of the Consensus Assessments Initiative Questionnaire that was developed by the Cloud Security Alliance; propose a Fuzzy Likert Provider Security Measurement prototype that uses fuzzy logic, Likert scales and decision making technologies to assess the cloud service providers’ security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arbabioon, P., Pilavari, N.: Fuzzy logic cloud computing user’s satisfaction assessment methodology. Rev. Bus. Res. 11, 151 (2011)

    Google Scholar 

  2. Bharadwaj, B.: Development of a fuzzy likert scale for the who ICF to include categorical definitions on the bases of a continuum. Master’s thesis, Wayne State University (2007)

    Google Scholar 

  3. Cloud security alliance: consensus assessments initiative questionnaire v3.0.1. https://cloudsecurityalliance.org/download/consensus-assessments-initiative-questionnaire-v3-0-1/

  4. Davis, M.: Cloud security: verify, don’t trust, informationweek::report. http://reports.informationweek.com/abstract/5/8978/Cloud-Computing/Research-Cloud-Security-Verify-Don’t-Trust.html

  5. Decker, K.: What joni mitchell might say about cloud computing. http://decker.com/blog/2010/05/what-joni-mitchell-might-say-about-cloud-computing/

  6. Gibson, J., Rondeau, R., Eveleigh, D., Qing, T.: Benefits and challenges of three cloud computing service models. In: Fourth International Conference on Computational Aspects of Social Networks (2012)

    Google Scholar 

  7. Hedayatpanah, A.: Fuzzy approach to likert spectrum in classified levels in surveying researches. J. Math. Comput. Sci. 2, 394–401 (2011)

    Google Scholar 

  8. Jamil, D., Zaki, H.: Cloud computing security. Int. J. Eng. Sci. Technol. 3(4), 3478–3483 (2011)

    Google Scholar 

  9. Lee, C.: Fuzzy logic in control systems: fuzzy logic controller. IEEE Trans. Syst. Man Cybern. 20, 404–418 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lee, Y., Huang, S.: A new fuzzy concept approach to kano’s model. Expert Syst. Appl. 36, 4479–4484 (2009)

    Article  Google Scholar 

  11. Rivera, J., Yu, H., Williams, K., Zhan, J., Yuan, X.: Assessing the security posture of cloud service providers. In: International Conference on IS Management and Evaluation (2015)

    Google Scholar 

  12. Supriya, M., Venkataramana, L., Sangeeta, K., Patra, G.: Estimating trust value for cloud service providers using fuzzy logic. Int. J. Comput. Appl. 48(19), 28–34 (2012)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by National Science Foundation under the award numbers CNS-0909980 and DUE-1129136.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiming Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yu, H., Williams, K., Yuan, X. (2015). Cloud Computing Threats and Provider Security Assessment. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics