{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T22:53:30Z","timestamp":1674082410019},"reference-count":25,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7,1]]},"abstract":"<p>Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.<\/p>","DOI":"10.4018\/ijertcs.2016070101","type":"journal-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T13:42:00Z","timestamp":1490362920000},"page":"1-14","source":"Crossref","is-referenced-by-count":4,"title":["A Multi-Dimensional Mean Failure Cost Model to Enhance Security of Cloud Computing Systems"],"prefix":"10.4018","volume":"7","author":[{"given":"Mouna","family":"Jouini","sequence":"first","affiliation":[{"name":"Laboratoire SOIE, Institut Sup\u00e9rieur de Gestion, Tunis, Tunisia"}]},{"given":"Latifa Ben Arfa","family":"Rabai","sequence":"additional","affiliation":[{"name":"Laboratoire SOIE, Institut Sup\u00e9rieur de Gestion, Tunis, Tunisia"}]}],"member":"2432","reference":[{"key":"IJERTCS.2016070101-0","unstructured":"Alemu, M., & Omer, A. (2014). Cloud Computing Conceptual Security Framework for Banking Industry. Journal of Emerging Trends in Computing and Information Sciences, 5(12), 921-930."},{"key":"IJERTCS.2016070101-1","doi-asserted-by":"crossref","unstructured":"Aljawarneh, SA., & Bani Yassein MO. (2016). A Conceptual Security Framework for Cloud Computing Issues. the International Journal of Intelligent Information Technologies, 12(2), 12-24.","DOI":"10.4018\/IJIIT.2016040102"},{"key":"IJERTCS.2016070101-2","unstructured":"Barron, C., Yu, H., & Zhan, J. (2013). Cloud Computing Security Case Studies and Research. Proceedings of the 2013 International Conference of Parallel and Distributed Computing."},{"key":"IJERTCS.2016070101-3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246112"},{"key":"IJERTCS.2016070101-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2012.06.002"},{"key":"IJERTCS.2016070101-5","unstructured":"Cloud Security Alliance (CSA). (2011). Security guidance for critical areas of focus on Cloud Computing V 3.0."},{"key":"IJERTCS.2016070101-6","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"issue":"1","key":"IJERTCS.2016070101-7","article-title":"A survey of Cloud Computing Security challenges and solutions","volume":"14","author":"N.Hassan Hussein","year":"2016","journal-title":"International Journal of Computer Science and Information Security"},{"key":"IJERTCS.2016070101-8","unstructured":"IDG Cloud Computing Survey. (2014). Cloud Continues to Transform Business Landscape as CIOs Explore New Areas for Hosting. Retrieved from http:\/\/www.idgenterprise.com\/news\/press-release\/cloud-continues-to-transform-business-landscape-as-cios-explore-new-areas-for-hosting\/"},{"key":"IJERTCS.2016070101-9","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2016.9.1.05"},{"key":"IJERTCS.2016070101-10","doi-asserted-by":"crossref","unstructured":"Jouini, M., & Ben Arfa Rabai, L. (2014). Surveying and Analyzing Security Problems in Cloud Computing Environments. Proceedings of the 10th International Conference on Computational Intelligence and Security (CIS \u201814) (pp. 689\u2013493).","DOI":"10.1109\/CIS.2014.169"},{"key":"IJERTCS.2016070101-11","doi-asserted-by":"crossref","unstructured":"Jouini, M., Ben Arfa Rabai, L., & Ben Aissa, A. (2014). Classification of security threats in information systems. Proceedings of ANT\/SEIT 2014.","DOI":"10.1016\/j.procs.2014.05.452"},{"issue":"3","key":"IJERTCS.2016070101-12","first-page":"265","article-title":"Towards quantitative measures of information security: A cloud computing case study.","volume":"1","author":"M.Jouini","year":"2012","journal-title":"International Journal of Cyber-Security and Digital Forensics"},{"key":"IJERTCS.2016070101-13","doi-asserted-by":"crossref","unstructured":"Jouini, M., Ben Arfa Rabai, L., & Khedri, R. (2015). A Multidimensional Approach Towards a Quantitative Assessment of Security Threats. Proceedings of ANT\/SEIT 15 (pp. 507-514).","DOI":"10.1016\/j.procs.2015.05.024"},{"key":"IJERTCS.2016070101-14","unstructured":"Kushwah, V. S., & Saxena, A. (2013). A Security approach for Data Migration in Cloud Computing. International Journal of Scientific and Research Publications, 3(5)."},{"key":"IJERTCS.2016070101-15","article-title":"The NIST definition of cloud computing.","author":"P.Mell","year":"2010","journal-title":"Communications of the ACM"},{"key":"IJERTCS.2016070101-16","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2011.6072868"},{"issue":"2","key":"IJERTCS.2016070101-17","first-page":"1","article-title":"A survey on security issues and countermeasures in cloud computing storage and a tour towards multi-clouds","volume":"1","author":"A.Priyadharshini","year":"2013","journal-title":"International Journal of Research in Engineering & Technology"},{"key":"IJERTCS.2016070101-18","unstructured":"Qaisar, S., & Khawaja, K.F. (2012). Cloud computing: network\/ security threats and countermeasures. Interdisciplinary journal of contemporary research in business, 3(9), 1323-1329."},{"key":"IJERTCS.2016070101-19","author":"R.Sampathkumar","year":"2015","journal-title":"Disruptive Cloud Computing and IT: Cloud Computing SIMPLIFIED for every IT Professional"},{"key":"IJERTCS.2016070101-20","unstructured":"Sherwood, J., Clark, A., & Lynas, D. (2009). Enterprise Security Architecture (White paper). SABSA Limited."},{"key":"IJERTCS.2016070101-21","unstructured":"Shrivastava, V., & Bhilare, D.S. (2015). SAFETY: A Framework for Secure IaaS Clouds, International journal of Advanced Networking and Applications, 6(6), 2549-2555."},{"key":"IJERTCS.2016070101-22","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/190903"},{"key":"IJERTCS.2016070101-23","doi-asserted-by":"crossref","unstructured":"Yan, L., Rong, C., & Zhao G, (2009), Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. Proceedings of CloudCom (pp. 167\u2013177).","DOI":"10.1007\/978-3-642-10665-1_15"},{"issue":"4","key":"IJERTCS.2016070101-24","first-page":"487","article-title":"A Framework for Secure Cloud Computing","volume":"9","author":"A. E.Youssef","year":"2012","journal-title":"IJCSI International Journal of Computer Science Issues"}],"container-title":["International Journal of Embedded and Real-Time Communication Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=180291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:41:59Z","timestamp":1654098119000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJERTCS.2016070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,7,1]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijertcs.2016070101","relation":{},"ISSN":["1947-3176","1947-3184"],"issn-type":[{"value":"1947-3176","type":"print"},{"value":"1947-3184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,1]]}}}