Skip to main content

2017 | OriginalPaper | Buchkapitel

Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA)

verfasst von : Joydeep Choudhury, Indushree Banerjee, Amitava Nag, Indika Parera

Erschienen in: Proceedings of the First International Conference on Intelligent Computing and Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Gathering personal information of individuals’, in return to provide different personalized services, continues to grow. The adaptability and flexibility of cloud that allows mobility of data access and multiple ownerships provide a favorable platform for users and service providers to adapt Cloud services for storing and accessing personal data. However data flow from one level to another service level of cloud may cause data loss or leakage and put the privacy of individuals at risk without them being aware of it. Ensuring privacy of information on Cloud, presents a major challenge to be tackled by future researchers. This paper aims at providing an overall picture of cloud privacy and security at its different level of architecture and discusses the proposed solutions. It will further provide detailed analyses of the various adopted techniques. We will also discuss Security-SLA as a security protection mechanism for cloud users. Further we will try to highlight the areas which can be further researched and make cloud a more secure place to store data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Y. Jadeja and K. Modi, “Cloud computing - concepts, architecture and challenges,” in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 877–880. Y. Jadeja and K. Modi, “Cloud computing - concepts, architecture and challenges,” in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 877–880.
2.
Zurück zum Zitat G. Zhang, Y. Yang, X. Zhang, C. Liu, and J. Chen, “Key Research Issues for Privacy Protection and Preservation in Cloud Computing,” in 2012 Second International Conference on Cloud and Green Computing, 2012, pp. 47–54. G. Zhang, Y. Yang, X. Zhang, C. Liu, and J. Chen, “Key Research Issues for Privacy Protection and Preservation in Cloud Computing,” in 2012 Second International Conference on Cloud and Green Computing, 2012, pp. 47–54.
3.
Zurück zum Zitat S. Hamouda, “Security and privacy in cloud computing,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 241–245, Dec. 2012. S. Hamouda, “Security and privacy in cloud computing,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 241–245, Dec. 2012.
4.
Zurück zum Zitat S. Surianarayanan and T. Santhanam, “Security issues and control mechanisms in Cloud,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 74–76, Dec. 2012. S. Surianarayanan and T. Santhanam, “Security issues and control mechanisms in Cloud,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 74–76, Dec. 2012.
5.
Zurück zum Zitat H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Secur. Priv. Mag., vol. 8, no. 6, pp. 24–31, Nov. 2010. H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Secur. Priv. Mag., vol. 8, no. 6, pp. 24–31, Nov. 2010.
6.
Zurück zum Zitat Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” J. Internet Serv. Appl., vol. 1, no. 1, pp. 7–18, Apr. 2010. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” J. Internet Serv. Appl., vol. 1, no. 1, pp. 7–18, Apr. 2010.
7.
Zurück zum Zitat C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, Oct. 2012. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, Oct. 2012.
8.
Zurück zum Zitat S. M. Rahaman and M. Farhatullah, “PccP: A model for Preserving cloud computing Privacy,” 2012 Int. Conf. Data Sci. Eng., pp. 166–170, Jul. 2012. S. M. Rahaman and M. Farhatullah, “PccP: A model for Preserving cloud computing Privacy,” 2012 Int. Conf. Data Sci. Eng., pp. 166–170, Jul. 2012.
9.
Zurück zum Zitat S. De Capitani Di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,” 7th Int. Conf. Risks Secur. Internet Syst. Cris. 2012, 2012. S. De Capitani Di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,” 7th Int. Conf. Risks Secur. Internet Syst. Cris. 2012, 2012.
10.
Zurück zum Zitat K. Surya, M. Nivedithaa, S. Uma, and C. Valliyammai, “Security issues and challenges in cloud,” 2013 Int. Conf. Green Comput. Commun. Conserv. Energy, pp. 889–893, 2013. K. Surya, M. Nivedithaa, S. Uma, and C. Valliyammai, “Security issues and challenges in cloud,” 2013 Int. Conf. Green Comput. Commun. Conserv. Energy, pp. 889–893, 2013.
11.
Zurück zum Zitat D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012.
12.
Zurück zum Zitat P. Yadav and S. Sujata, “Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA,” Int. J. Cloud Comput. Serv. Archit., vol. 3, no. 3, pp. 25–40, 2013. P. Yadav and S. Sujata, “Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA,” Int. J. Cloud Comput. Serv. Archit., vol. 3, no. 3, pp. 25–40, 2013.
13.
Zurück zum Zitat I. Roy, S. T. V. S. T. V Setty, A. Kilzer, V. Shmatikov, and E. Witchel, “Airavat: Security and privacy for MapReduce,” Proc. 7th USENIX Conf. Networked Syst. Des. Implement., pp. 20–20, 2010. I. Roy, S. T. V. S. T. V Setty, A. Kilzer, V. Shmatikov, and E. Witchel, “Airavat: Security and privacy for MapReduce,” Proc. 7th USENIX Conf. Networked Syst. Des. Implement., pp. 20–20, 2010.
14.
Zurück zum Zitat D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 973, pp. 647–651, 2012. D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 973, pp. 647–651, 2012.
15.
Zurück zum Zitat M. P. K. Shelke, M. S. Sontakke, and a D. Gawande, “Intrusion Detection System for Cloud Computing,” Int. J. Sci. Technol. Res., vol. 1, no. 4, pp. 67–71, 2012. M. P. K. Shelke, M. S. Sontakke, and a D. Gawande, “Intrusion Detection System for Cloud Computing,” Int. J. Sci. Technol. Res., vol. 1, no. 4, pp. 67–71, 2012.
16.
Zurück zum Zitat H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and Prevention System in Cloud Computing,” in 2013 Africon, 2013, pp. 1–5. H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and Prevention System in Cloud Computing,” in 2013 Africon, 2013, pp. 1–5.
17.
Zurück zum Zitat C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing,” Procedia Technol., vol. 6, pp. 905–912, 2012. C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing,” Procedia Technol., vol. 6, pp. 905–912, 2012.
18.
Zurück zum Zitat L. Chen and D. B. Hoang, “Novel Data Protection Model in Healthcare Cloud,” in 2011 IEEE International Conference on High Performance Computing and Communications, 2011, pp. 550–555. L. Chen and D. B. Hoang, “Novel Data Protection Model in Healthcare Cloud,” in 2011 IEEE International Conference on High Performance Computing and Communications, 2011, pp. 550–555.
19.
Zurück zum Zitat H. Tianfield, “Security issues in cloud computing,” 2012 IEEE Int. Conf. Syst. Man, Cybern., pp. 1082–1089, Oct. 2012. H. Tianfield, “Security issues in cloud computing,” 2012 IEEE Int. Conf. Syst. Man, Cybern., pp. 1082–1089, Oct. 2012.
20.
Zurück zum Zitat M. Hoehl, “Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud.”. M. Hoehl, “Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud.”.
21.
Zurück zum Zitat R. Schmidt, “Conceptualisation and Lifecycle of Cloud Based Information Systems,” 2012 IEEE 16th Int. Enterp. Distrib. Object Comput. Conf. Work., pp. 104–113, 2012. R. Schmidt, “Conceptualisation and Lifecycle of Cloud Based Information Systems,” 2012 IEEE 16th Int. Enterp. Distrib. Object Comput. Conf. Work., pp. 104–113, 2012.
22.
Zurück zum Zitat K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, “Security SLAs for Federated Cloud Services,” in 2011 Sixth International Conference on Availability, Reliability and Security, 2011, pp. 202–209. K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, “Security SLAs for Federated Cloud Services,” in 2011 Sixth International Conference on Availability, Reliability and Security, 2011, pp. 202–209.
23.
Zurück zum Zitat M. Jaatun, K. Bernsmed, and A. Undheim, “Security SLAs–An Idea Whose Time Has Come?,” Multidiscip. Res. Pract. Inf. Syst., pp. 123–130, 2012. M. Jaatun, K. Bernsmed, and A. Undheim, “Security SLAs–An Idea Whose Time Has Come?,” Multidiscip. Res. Pract. Inf. Syst., pp. 123–130, 2012.
24.
Zurück zum Zitat S. A. de Chaves, C. B. Westphall, and F. R. Lamin, “SLA Perspective in Security Management for Cloud Computing,” in 2010 Sixth International Conference on Networking and Services, 2010, pp. 212–217. S. A. de Chaves, C. B. Westphall, and F. R. Lamin, “SLA Perspective in Security Management for Cloud Computing,” in 2010 Sixth International Conference on Networking and Services, 2010, pp. 212–217.
25.
Zurück zum Zitat M. Rak, N. Suri, J. Luna, D. Petcu, V. Casola, and U. Villano, “Security as a Service Using an SLA-Based Approach via SPECS,” Requir. Eng. Cloud Comput. (RECC - CloudCom), vol. 2, pp. 1–6, 2013. M. Rak, N. Suri, J. Luna, D. Petcu, V. Casola, and U. Villano, “Security as a Service Using an SLA-Based Approach via SPECS,” Requir. Eng. Cloud Comput. (RECC - CloudCom), vol. 2, pp. 1–6, 2013.
Metadaten
Titel
Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA)
verfasst von
Joydeep Choudhury
Indushree Banerjee
Amitava Nag
Indika Parera
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2035-3_7