Leveraged BMIS Model for Cloud Risk Control
نویسندگان
چکیده
Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security management and framework in the information system. In this paper, we find the specific business meaning of the BMIS model and try to apply and leverage this model to cloud risk. Through a previous study, we select and determine the causal risk factors in cloud service, which are also known as CSFs (Critical Success Factors) in information management. Subsequently, we distribute all selected CSFs into the BMIS model by mapping with ten principles in cloud risk. Finally, by using the leverage points, we try to leverage the model factors and aim to make a resource-optimized, dynamic, general risk control business model for cloud service providers. Keywords—Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
منابع مشابه
An Approach of Risk Management for Multimedia Streaming Service in Cloud Computing
Along with internet broadcasting technology, cloud broadcasting is gradually becoming the development tendency to audience view. But the problems which existed in cloud environment also may affect in cloud based multimedia streaming service area. In this paper, we proposes an approach of risk management for multimedia streaming service in cloud computing. Through previous study, we recommended ...
متن کاملHow to Manage Cloud Risks Based on the BMIS Model
Information always comes with security and risk problems. There is the saying that, “The tall tree catches much wind,” and the risks from cloud services will absolutely be more varied and more severe. Nowadays, handling these risks is no longer just a technology problem. So far, a good deal of literature that focuses on risk or security management and frameworks in information systems has alrea...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملDo body mass index trajectories affect the risk of type 2 diabetes? A case–control study
BACKGROUND Although obesity is a well-studied risk factor for diabetes, there remains an interest in whether "increasing body mass index (BMI)," "high BMI per se," or both are the actual risk factors for diabetes. The present study aimed to retrospectively compare BMI trajectories of individuals with and without diabetes in a case-control design and to assess whether increasing BMI alone would ...
متن کاملFinal Report Survey on Cache Partition for Cloud Security Purpose
Cache-based side-channel is a behavior of cache memory which will possibly leak secret information. In cloud computing services, providers share physical resources, i.e. infrastructures, to support multi-tenancy of cloud platform, which will achieve high quality of cost efficiency, availability, and on-demand scaling. However, by sharing the infrastructure, sensitive data from individual users ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JIPS
دوره 10 شماره
صفحات -
تاریخ انتشار 2014