A risk model for cloud processes

Authors

Abstract:

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification of "typical" threats and attack vectors. Also, the dynamic, multi-party nature of cloud-based processes makes severity assessment very dependent on the particular set of stakeholders involved in each process execution. In this paper, we tackle these problems by presenting a novel, process-oriented quantitative risk assessment methodology aimed at disclosure risks on cloud computing platforms. Key advantages of our methodology include (i) a fully quantitative and iterative approach, which enables stakeholders to compare alternative versions of cloud-based processes (e.g., with and without security controls) (ii) non-frequency-based probability estimates, which allow analyzing threats for which a detailed history is not available (iii) support for quick visual comparisons of risk profiles of alternative processes even when impact cannot be exactly quantified.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

A FUZZY MODEL FOR ASSESSMENT PROCESSES

The methods of assessing the individuals’ performance usually applied in practice are based on principles of the bivalent logic (yes-no). However, fuzzy logic, due to its nature of including multiple values, offers a wider and richer field of resources for this purpose. In this paper we use principles of fuzzy logic in developing a new method for assessing the performance of groups of individua...

full text

a fuzzy model for assessment processes

the methods of assessing the individuals’ performance usually applied in practice are based on principles of the bivalent logic (yes-no). however, fuzzy logic, due to its nature of including multiple values, offers a wider and richer field of resources for this purpose. in this paper we use principles of fuzzy logic in developing a new method for assessing the performance of groups of individua...

full text

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

Leveraged BMIS Model for Cloud Risk Control

Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security ...

full text

Fuzzy model for risk analysis

The goal of this paper is to show how the concept of fuzzy logic can be used to establish a degree to which an investment project belongs to a class of risk. Also, the probability of the fuzzy event is presented and is ap-plied to calculate the probability of the fuzzy event “the project X is a good investment”. This process has to enable the decision maker to compare several alternative invest...

full text

CSRA Model - A Cloud Service Risk Assessment Model

International Journal Web Applications Volume 7 Number 2 June 2015 ABSTRACT: Cloud computing is considered a paradigm both technology and business. Its widespread adoption is an increasingly effective trend. However, the lack of quality metrics and audit of services offered in the cloud slows its use, and it stimulates the increase in focused discussions with the adaptation of existing standard...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 6  issue 2

pages  99- 123

publication date 2014-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023