CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework

The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.

[1]  Xiaojiang Du,et al.  Efficiently secure data privacy on hybrid cloud , 2013, 2013 IEEE International Conference on Communications (ICC).

[2]  Fekade Getahun Taddesse,et al.  Cloud readiness assessment framework and recommendation system , 2015, AFRICON 2015.

[3]  Juan Li,et al.  Multi-Cloud Governance Service based on Model Driven Policy Generation , 2013, CLOSER.

[4]  B. V. Thirumala Rao,et al.  A Secured Cloud Data Storage with Access Privileges , 2016 .

[5]  M. P. F. C. A. J. Sammes BSc,et al.  Forensic Computing , 2000, Practitioner Series.

[6]  Ausra Dilijonaite,et al.  Digital Forensic Readiness , 2017 .

[7]  Song Guo,et al.  Byzantine-Resilient Secure Software-Defined Networks with Multiple Controllers in Cloud , 2014, IEEE Transactions on Cloud Computing.

[8]  Randall Craig Reid,et al.  Using the Parkerian Hexad to introduce security in an information literacy class , 2010, InfoSecCD.

[9]  Yogesh Pai Create, Copy, Disrupt: India's Intellectual Property Dilemmas , 2016 .

[10]  Albert Sagala,et al.  Private Cloud Storage Using OpenStack with Simple Network Architecture , 2016 .

[11]  Kim-Kwang Raymond Choo,et al.  An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..

[12]  Adrian McEwen,et al.  Designing the Internet of Things , 2013 .

[13]  Sangjin Lee,et al.  A new triage model conforming to the needs of selective search and seizure of electronic evidence , 2013, Digit. Investig..

[14]  Stephen D. Wolthusen,et al.  Mitigation of Cloud-Internal Denial of Service Attacks , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.

[15]  Xiaoping Wu,et al.  Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[16]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[17]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[18]  T. Senthil Kumaran,et al.  Cloud Deployment Methods In Guarantee of Protection and Confidentiality Constraints , 2018 .

[19]  Zhiyong Li,et al.  Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud , 2013 .

[20]  Kim-Kwang Raymond Choo,et al.  Cloud Storage Forensic Framework , 2014 .

[21]  George Sibiya,et al.  Digital forensic readiness in a cloud environment , 2013, 2013 Africon.

[22]  Chia Hung Kao,et al.  A prototype system for object management in private cloud , 2011, 2011 International Conference on Cloud and Service Computing.