Future work is geared towards the validation of
the proposed methodology in actual organizations
and subsequent development of a tool based on this.
Moreover, we intend to include information
regarding cloud security capabilities (e.g. Data at
rest encryption, multi-factor authentication, Trusted
Cloud Computing Platform) of the provider during
computation of risk factors. This would help provide
assurance about the security measures that are
deployed by the cloud service provider.
REFERENCES
Bell, D.E., and LaPadula, L.J., 1976 "Secure Computer
Systems: Unified Exposition and Multics
Interpretation", ESD-TR-75-306, MTR 2997 Rev. I,
Mitre Corporation, Bedford, Massachusetts, USA,
1976.
Bhattacharjee, J., Sengupta, A., and Mazumdar, M., 2013.
“A Formal Methodology for Enterprise Information
Security Risk Assessment”. In International
Conference on Risks and Security of Internet and
Systems (CRiSIS). France: IEEE, pp. 1-9.
Casola V., et.al. 2005. “A Reference Model for Security
Level Evaluation: Policy and Fuzzy Techniques.” In
Journal of Universal Computer Science. 11(1), pp.
150–174.
Cayirci, E., Garaga, A., Santana, A., and Roudier, Y.,
2014. “A Coud Adoption Risk Assessment Model”. In
7th International Conference on Utility and Cloud
Computing. London: IEEE, pp. 908-913.
CSA. (2014), The Notorious Nine Cloud Computing Top
Threats in 2013, [online] Available at
https://downloads.cloudsecurityalliance.org/initiatives/
top_threats/The_Notorious_Nine_Cloud_Computing_
Top_Threats_in_2013.pdf. [Accessed 16 November
2016]
Djemame, K., Armstrong D., Guitart J., and Macias M.,
2016. “A Risk Assessment Framework for Cloud
Computing”. In IEEE Transactions on Cloud
Computing. 4(3), pp. 265-278.
ENISA, “Cloud Computing; Benefits, Risks and
Recommendations for Information Security,” 2009
Edition, Place: Available at
http://www.enisa.europe.eu, [Accessed 16 November
2016]
Hashizume, K. Rosado, D.G., Fernández-Medina, E., and
Fernandez, E.B., 2013 “An analysis of security issues
for cloud computing”, In J. Int. Serv. App. vol. 4(5), .
pp. 1-13.
“ISO/lEC 27005:2005,” Information technology - Security
techniques - Code of practice for information security
management”, Switzerland, 1st Edition.
“ISO/lEC 27005:2011, “Information technology - Security
techniques Information security risk management”,
Switzerland, 1st Edition.
“ISO/ lEC 17789:2014(E), Information technology –
Cloud Computing – Reference Architecture”,
Switzerland, 1st Edition.
Jansen, W. and Grance, T., 2011. “Guidelines on Security
& Privacy in Public Cloud Computing”. In Computer
Security Publications from the National Institute of
Standards and Technology (NIST) SP 800-144.
Gaithersburg: National Institute of Standards &
Technology.
Kaplan, S., and Garrick B.J., 1981. “On The Quantitative
Definition of Risk,” In the Journal of Risk Analysis
1(1), pp. 11-27.
Luna, J. L., Langenberg, R., and Suri, N. 2012.
“Benchmarking cloud security level agreements using
quantitative policy trees”. Cloud Computing Security
Workshop, 103. doi:10.1145/2381913.2381932.
Mell, P. M., and T. Grance., 2011. “The NIST Definition
of Cloud Computing.” In Computer Security
Publications from the National Institute of Standards
and Technology (NIST) SP 800-145. Gaithersburg:
National Institute of Standards & Technology.
Mell, P., Scarfone, K., and Romanosky, S., 2007 “CVSS –
A Complete Guide to the Common Vulnerability
Scoring System Version 2.0”.
Sengupta, A., Mazumdar, C., and Bagchi, A., 2009. “A
Formal Methodology for Detection of Vulnerabilities
in an Enterprise Information System”, In Proceedings
of the Fourth International Conference on Risks and
Security of Internet and Systems (CRiSIS), 2009,
France:IEEE, 74-81.