Abstract
With the development of cloud computing and internet and the wide combination of them, internet mobile internet security issues under the cloud computing mode become more and more significant. Compared with the traditional internet security problems, the new one could cause much more serious destructions, so it is necessary to pull out the mobile internet security risk evaluation method based cloud computing mode as soon as possible. This passage has analyzed deeply of the technological characteristics, service’s modes and new appeared security issues of mobile internet under the cloud computing mode. Combined with current information security risk evaluation methods, the passage also provides new mobile internet security risk evaluate method. This method includes assets identification, threat identification, fragility identification, existed security measures confirmation and risk computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011). (in Chinese)
Yang, Y., Lai, Y.: The security issues under the cloud computing environment. Comput. Knowl. Technol. 5(16), 4154–4156 (2009). (in Chinese)
Saaty, T.L.: A scaling method for priorities in hierarchical structures. J. Math. Psychol. 15(3), 234–281 (1977)
Yue, Y., Yue, S.: Method based on numerical analysis for information security assessment. Comput. Eng. Des. 27(3), 404–410 (2006). (in Chinese)
GBT 20984-2007, Information security technology— risk assessment specification for information security
Cai, Y.F.: Information systems security risk assessment model based on cloud computing. Chin. Manage. Inf. 012, 75–77 (2010). (in Chinese)
Acknowledgement
This paper is a part of research achievement of “Research on mobile Internet security issues under the application mode of cloud computing (No. 2012ZX03002003-005)”, which is one of project of National Science and Technology Major Project “Next-generation Broadband Wireless Mobile Communication Network”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, L., Guo, Y., Zhou, F. (2014). Security Risk Assessment of Mobile Internet Under Cloud Computing Mode. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)