Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special section: Intelligent data analysis and applications & smart vehicular technology, communications and applications
Guest editors: Valentina Emilia Balas and Lakhmi C. Jain
Article type: Research Article
Authors: Tariq, Muhammad Imrana; * | Tayyaba, Shahzadib | Ali Mian, Natashc | Sarfraz, Muhammad Shahzadd | De-la-Hoz-Franco, Emiroe | Butt, Shariq Azizb | Santarcangelo, Vitof | Rad, Dana V.g
Affiliations: [a] Department of Computer Science, the Superior University, Lahore, Pakistan | [b] Deparment of Computer Engineering, the University of Lahore, Lahore, Pakistan | [c] School of Computer and Information Technology, Beaconhouse National University, Lahore | [d] Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Chiniot-Faisalabad Campus, Pakistan | [e] Universidad De La Costa, CUC, Colombia | [f] iInformatica S.r.l.s. – Corso Italia 77 Trapani | [g] Aurel Vlaicu University of Arad, Romania
Correspondence: [*] Corresponding author. Muhammad Imran Tariq, Department of Computer Science, the Superior University, Gold Campus, Raiwind Road, Lahore, Pakistan. Tel.: +92 333 4778823; E-mail: [email protected].
Abstract: The organizations utilizing the cloud computing services are required to select suitable Information Security Controls (ISCs) to maintain data security and privacy. Many organizations bought popular products or traditional tools to select ISCs. However, selecting the wrong information security control without keeping in view severity of the risk, budgetary constraints, measures cost, and implementation and mitigation time may lead to leakage of data and resultantly, organizations may lose their user’s information, face financial implications, even reputation of the organization may be damaged. Therefore, the organizations should evaluate each control based on certain criteria like implementation time, mitigation time, exploitation time, risk, budgetary constraints, and previous effectiveness of the control under review. In this article, the authors utilized the methodologies of the Multi Criteria Decision Making (MCDM), Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to help the cloud organizations in the prioritization and selection of the best information security control. Furthermore, a numerical example is also given, depicting the step by step utilization of the method in cloud organizations for the prioritization of the information security controls.
Keywords: Information security, Analytical Hierarchy Process, TOPSIS, fuzzy logic, MCDM, MADM
DOI: 10.3233/JIFS-179692
Journal: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6075-6088, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]