CFP last date
20 January 2025
Reseach Article

Towards a Cybersecurity Model for Selecting the Secured Cloud Service Provider using Security Risk Approach

by Jamal Talbi, Abdelkrim Haqiq
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 12
Year of Publication: 2015
Authors: Jamal Talbi, Abdelkrim Haqiq
10.5120/ijca2015906146

Jamal Talbi, Abdelkrim Haqiq . Towards a Cybersecurity Model for Selecting the Secured Cloud Service Provider using Security Risk Approach. International Journal of Computer Applications. 125, 12 ( September 2015), 1-6. DOI=10.5120/ijca2015906146

@article{ 10.5120/ijca2015906146,
author = { Jamal Talbi, Abdelkrim Haqiq },
title = { Towards a Cybersecurity Model for Selecting the Secured Cloud Service Provider using Security Risk Approach },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 12 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number12/22481-2015906146/ },
doi = { 10.5120/ijca2015906146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:49.445834+05:30
%A Jamal Talbi
%A Abdelkrim Haqiq
%T Towards a Cybersecurity Model for Selecting the Secured Cloud Service Provider using Security Risk Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 12
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a rising field providing computation resources. It represents a new paradigm of utility computing and enormously growing phenomenon in the present IT industry and economy hype. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs) increase and require secure, reliable and trustworthy cloud service providers (CSPs) from the market. So, it’s a challenge for a new customer to choose the highly secure provider. In this paper, we propose a cybersecurity model to analyze and select the secured cloud service provider. This model uses a CSP Rank Framework for the group of cloud providers by assessing security risks in terms of confidentiality, integrity, availability, non-repudiation and authenticity which make decision of the more secured provider among the available providers list and justify the business needs of users in terms of security and reliability.

References
  1. Caron, E., Duang Le, A., Lefray, A. and Toinard, K. 2013. Definition of security metrics for the cloud computing and security-aware virtual machine placement algorithms, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013 IEEE.
  2. K. Amrutha, B. Madhu, "An efficient approach to find best cloud provider using broker", International Journal of Advanced Research in Computer Science and Software Engineering, 2014.
  3. Linden, G., Smith, B. and York, J. 2003. Amazon.com Recommendations: Item-to-Item Collaborative Filtering, IEEE Internet Computing, vol.7, no.1, pp.76-80,Jan./Feb.2003.
  4. Zibin, Z., Yilei, Z. and Lyu, M. R. 2010. Cloud Rank: A QoS-Driven component ranking framework for cloud computing. In Reliable Distributed Systems, 29th IEEE Symposium on 2010, pp.184-193.
  5. Zheng, Z., Ma, H., Lyu M.R. and King I. 2011. QoS-Aware web service recommendation by collaborative filtering. IEEE Trans. Service Computing, vol.4, no.2, pp.140-152, Apr.-June 2011.
  6. P. Dhillon, V. Arora, "A compositional approach of reliable and efficient cloud service selection", International Journal of Advanced Research in Computer Science and Software Engineering, 2012.
  7. Zheng, Z., Wu, X., Zhang, Y., Lyu, M.R., Wang, J. 2013. QoS Ranking prediction for cloud services, Parallel and Distributed Systems, IEEE Transactions on, vol.24, no.6, pp.1213-1222, June 2013.
  8. D. Kapgate, "Weighted moving average forecast model based prediction for service broker algorithm for cloud computing", International Journal of Computer Science and Mobile Computing, 2014.
  9. M. Subha, M.U. Banu, "A survey on QoS ranking in cloud computing", International Journal of Emerging Technology and Advanced Engineering, 2014.
  10. R. Yuvarani, M. Sivalakshmi, "Achieve ranking accuracy using cloud rank framework for cloud services", International Journal of Innovative Research in Computer and Communication Engineering, 2014.
  11. P. Bathla, S. Vashit, "A sophisticated study of QoS ranking frameworks in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering, 2014.
  12. Whaiduzzaman, M. and Gani, A. 2013. Measuring security for cloud service provider: A third party approach, International Conference on Electrical Information and Communication Technology (EICT), 2013 IEEE.
  13. Salam, A., 2012. What is the key criterion for selecting a cloud service provider?, CloudTweak.
  14. Pfleeger, C.P. and Pfleeger, S.L. 2003. Security in Computing, 3rd edition, Prentice Hall.
  15. Cloud Security Alliance. Cloud Control Matrix / Security, Trust & Assurance Registry / Consensus Assessments Initiative Questionnaire. Technical report.
  16. Elio, G., Dahman, K., Gateau, B. and Godart, C. 2014. A broker framework for secure and cost-effective business process deployment on multiple clouds, CAiSE 2014 Forum/Doctoral Consortium, Thessaloniki, Greece. June 2014.
  17. Lenkala, S. R., Shetty, S. and Xiong, K.2013. Security risk assessment of cloud carrier, International Symposium on Cluster, Cloud, and Grid (CCGrid), pp.442-449, 2013 IEEE/ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cybersecurity Model CSP Rank Framework Security Risk.