Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these measures would comply with their security and compliance requirements. We have conducted a comprehensive study to review the potential threats faced by cloud consumers and have determined the compliance models and security controls that should be in place to manage the risk. Based on this study, we have developed an ontology describing the cloud security controls, threats and compliances. We have also developed an application that classifies the security threats faced by cloud users and automatically determines the high level security and compliance policy controls that have to be activated for each threat. The application also displays existing cloud providers that support these security policies. Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.
[1]
O. KuyoroS.,et al.
Cloud computing security issues and challenges
,
2011
.
[2]
V. Kavitha,et al.
A survey on security issues in service delivery models of cloud computing
,
2011,
J. Netw. Comput. Appl..
[3]
Karen A. Scarfone,et al.
Computer Security Incident Handling Guide
,
2004
.
[4]
Christopher T. Marsden,et al.
Privacy and data protection
,
2013
.
[5]
Mahadevan Gomathisankaran,et al.
Nemesis : Automated Architecture for Threat Modeling and Risk Assessment for Cloud Computing
,
2014
.
[6]
S Ramgovind,et al.
The management of security in Cloud computing
,
2010,
2010 Information Security for South Africa.
[7]
Tim Mather,et al.
Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance
,
2009,
Theory in practice.
[8]
Deborah L. McGuinness,et al.
OWL Web ontology language overview
,
2004
.
[9]
P. Mell,et al.
The NIST Definition of Cloud Computing
,
2011
.