Cloud Security and Compliance - A Semantic Approach in End to End Security

Dr. R. Udayakumar Research Supervisor, Associate Professor, Department of Information Technology, Bharath University, Chennai, India ABSTRACT The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mishmash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these measures would comply with their security and compliance requirements. We have conducted a comprehensive study to review the potential threats faced by cloud consumers and have determined the compliance models and security controls that should be in place to manage the risk. Based on this study, we have developed an ontology describing the cloud security controls, threats and compliances. We have also developed an application that classifies the security threats faced by cloud users and automatically determines the high level security and compliance policy controls that have to be activated for each threat. The application also displays existing cloud providers that support these security policies. Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.

[1]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[2]  Ryohei Egusa,et al.  EDA-BASED ESTIMATION OF VISUAL ATTENTION BY OBSERVATION OF EYE BLINK FREQUENCY , 2017 .

[3]  Canras Batunlu,et al.  SMART SENSING SYSTEM FOR ENHANCEING THE RELIABILITY OF POWER ELECTRONIC DEVICES USED IN WIND TURBINES , 2017 .

[4]  Guowu Yang,et al.  Optimal synthesis of multiple output Boolean functions using a set of quantum gates by symbolic reachability analysis , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[5]  Jianbo Li,et al.  SOCIAL POPULARITY BASED ROUTING IN DELAY TOLERANT NETWORKS , 2016 .

[6]  Yen-Hong A. Chen,et al.  ASSESSMENT TO EFFECTIVENESS OF THE NEW EARLY STREAMER EMISSION LIGHTNING PROTECTION SYSTEM , 2017 .

[7]  J. M. Gnanasekar,et al.  Sector Routing Protocol (SRP) in Ad-hoc Networks , 2015 .

[8]  Farah Sharmin,et al.  Design of a Compact Reversible Random Access Memory , 2011 .

[9]  Mustapha Nadi,et al.  AN IN VITRO COST-EFFECTIVE TEST BENCH FOR ACTIVE CARDIAC IMPLANTS, REPRODUCING HUMAN EXPOSURE TO ELECTRIC FIELDS 50 HZ , 2017 .

[10]  Paolo Visconti,et al.  Development and Characterization of a Solarbased Energy Harvesting and Power Management System for a WSN Node Applied to Optimized Goods Transport and Storage , 2016 .

[11]  M.Rajesh J.M Gnanasekar Routing and Broadcast Development for Minimizing Transmission Interruption in Multi rate Wireless Mesh Networks using Directional Antennas , 2015 .

[12]  Iman Heidarpour Shahrezaei,et al.  A TOTAL QUALITY ASSESSMENT SOLUTION FOR SYNTHETIC APERTURE RADAR NLFM WAVEFORM GENERATION AND EVALUATION IN A COMPLEX RANDOM MEDIA , 2017 .

[13]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[14]  Patrizio Primiceri,et al.  A SOLAR-POWERED WHITE LED-BASED UV-VIS SPECTROPHOTOMETRIC SYSTEM MANAGED BY PC FOR AIR POLLUTION DETECTION IN FARAWAY AND UNFRIENDLY LOCATIONS , 2017 .

[15]  Olfa Boubaker,et al.  Full Order Unknown Inputs Observer for Multiple Time-Delay Systems , 2016 .

[16]  Sallehuddin Ibrahim,et al.  TECHNIQUES IN ADVANCING THE CAPABILITIES OF VARIOUS NITRATE DETECTION METHODS: A REVIEW , 2017 .

[17]  J. van Leeuwen,et al.  Information Security , 2003, Lecture Notes in Computer Science.

[18]  M. Rajesh,et al.  GCC over Heterogeneous Wireless Ad hoc Networks , 2015 .

[19]  Lafifa Jamal,et al.  Design of Optimal Reversible Carry Look-Ahead Adder with Optimal Garbage and Quantum Cost , 2012 .

[20]  Kamakoti Veezhinathan,et al.  Constructing Online Testable Circuits Using Reversible Logic , 2010, IEEE Transactions on Instrumentation and Measurement.

[21]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[22]  Aslam B Nandyal,et al.  ENHANCEMENT OF CLOUD SECURITY THROUGH SCHEDULED HIDING OF DATA , 2015 .

[23]  Samarendra Nath Sur,et al.  FEEDBACK EQUALIZER FOR VEHICULAR CHANNEL , 2017 .

[25]  Chokri Rekik,et al.  DESIGN AND DEVELOPMENT OF 3D PRINTED MYOELECTRIC ROBOTIC EXOSKELETON FOR HAND REHABILITATION , 2017 .

[26]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[27]  J. M. Gnanasekar,et al.  Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Int. J. Wirel. Mob. Comput..