Holistic framework of security management for cloud service providers

Cloud computing allows for organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. As the march of cloud computing continues, it brings both new opportunities and new security issues. This paper introduces a holistic security management framework based on aligning policies relating to standards of IT governance and security management to fit with the cloud computing model. Further, some practical controls are discussed in detail, enabling cloud service providers and consumers to be security certified.

[1]  Valeria Cardellini,et al.  SLA-aware Resource Management for Application Service Providers in the Cloud , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.

[2]  Chiang Lung Liu,et al.  Identification of Critical Security Issues for Cloud Computing , 2011 .

[3]  M.V. Sriram,et al.  Optimization of knowledge sharing through Multi-Forum using cloud computing architecture , 2011, 2011 International Conference on Advanced Computer Science and Information Systems.

[4]  Rebecca Bulander,et al.  Cloud Computing Framework - A Framework to Evaluate Cloud Computing for IT Service Providers , 2011, CLOSER.

[5]  Anthony Sulistio,et al.  Mapping of Cloud Standards to the Taxonomy of Interoperability in IaaS , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[6]  Rajkumar Buyya,et al.  SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[7]  Jun Han,et al.  Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[8]  Antonio Puliafito,et al.  An Approach to Enable Cloud Service Providers to Arrange IaaS, PaaS, and Saas Using External Virtualization Infrastructures , 2011, 2011 IEEE World Congress on Services.

[9]  Hiroyuki Sato,et al.  Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.

[10]  Divyakant Agrawal,et al.  Secure Data Management in the Cloud , 2011, DNIS.

[11]  Feng Yan Analysis of Cloud Computing and Information Security , 2008 .

[12]  Rocco Aversa,et al.  A SLA-based interface for security management in cloud and GRID integrations , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[13]  Jörn Altmann,et al.  Cost-benefit analysis of an SLA mapping approach for defining standardized Cloud computing goods , 2012, Future Gener. Comput. Syst..

[14]  Enji Sun,et al.  The internet of things (IOT) and cloud computing (CC) based tailings dam monitoring and pre-alarm system in mines , 2012 .

[15]  Svetlana Kim,et al.  The evolution of standardization for mobile cloud , 2011, ICTC 2011.

[16]  Amani S. Ibrahim,et al.  Collaboration-Based Cloud Computing Security Management Framework , 2011, 2011 IEEE 4th International Conference on Cloud Computing.