Skip to main content

Security Risk Assessment of Mobile Internet Under Cloud Computing Mode

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

  • 1224 Accesses

Abstract

With the development of cloud computing and internet and the wide combination of them, internet mobile internet security issues under the cloud computing mode become more and more significant. Compared with the traditional internet security problems, the new one could cause much more serious destructions, so it is necessary to pull out the mobile internet security risk evaluation method based cloud computing mode as soon as possible. This passage has analyzed deeply of the technological characteristics, service’s modes and new appeared security issues of mobile internet under the cloud computing mode. Combined with current information security risk evaluation methods, the passage also provides new mobile internet security risk evaluate method. This method includes assets identification, threat identification, fragility identification, existed security measures confirmation and risk computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011). (in Chinese)

    Article  Google Scholar 

  2. Yang, Y., Lai, Y.: The security issues under the cloud computing environment. Comput. Knowl. Technol. 5(16), 4154–4156 (2009). (in Chinese)

    Google Scholar 

  3. Saaty, T.L.: A scaling method for priorities in hierarchical structures. J. Math. Psychol. 15(3), 234–281 (1977)

    Article  MATH  MathSciNet  Google Scholar 

  4. Yue, Y., Yue, S.: Method based on numerical analysis for information security assessment. Comput. Eng. Des. 27(3), 404–410 (2006). (in Chinese)

    Google Scholar 

  5. GBT 20984-2007, Information security technology— risk assessment specification for information security

    Google Scholar 

  6. Cai, Y.F.: Information systems security risk assessment model based on cloud computing. Chin. Manage. Inf. 012, 75–77 (2010). (in Chinese)

    Google Scholar 

Download references

Acknowledgement

This paper is a part of research achievement of “Research on mobile Internet security issues under the application mode of cloud computing (No. 2012ZX03002003-005)”, which is one of project of National Science and Technology Major Project “Next-generation Broadband Wireless Mobile Communication Network”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongzhen Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, L., Guo, Y., Zhou, F. (2014). Security Risk Assessment of Mobile Internet Under Cloud Computing Mode. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics