Traditional security risk assessment methods in cloud computing environment: Usability analysis

2Citations
Citations of this article
58Readers
Mendeley users who have this article in their library.

Abstract

The term “Cloud Computing” has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods’ ability to assess the security risks in cloud computing environments.

Cite

CITATION STYLE

APA

Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2015). Traditional security risk assessment methods in cloud computing environment: Usability analysis. Jurnal Teknologi, 73(2), 85–89. https://doi.org/10.11113/jt.v73.4197

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free