%0 Journal Article %T A risk model for cloud processes %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Damiani, E. %A Cimato, S. %A Gianini, G. %D 2014 %\ 07/01/2014 %V 6 %N 2 %P 99-123 %! A risk model for cloud processes %K cloud computing %K Value of Information %K Risk Assessment %K Secure Computation %R 10.22042/isecure.2015.6.2.2 %X Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification of "typical" threats and attack vectors. Also, the dynamic, multi-party nature of cloud-based processes makes severity assessment very dependent on the particular set of stakeholders involved in each process execution. In this paper, we tackle these problems by presenting a novel, process-oriented quantitative risk assessment methodology aimed at disclosure risks on cloud computing platforms. Key advantages of our methodology include (i) a fully quantitative and iterative approach, which enables stakeholders to compare alternative versions of cloud-based processes (e.g., with and without security controls) (ii) non-frequency-based probability estimates, which allow analyzing threats for which a detailed history is not available (iii) support for quick visual comparisons of risk profiles of alternative processes even when impact cannot be exactly quantified. %U https://www.isecure-journal.com/article_39155_18fdfeefba9699c84e274e1218517744.pdf