Assessing the Security Posture of Cloud Service Providers

被引:0
|
作者
Rivera, Jorge [1 ]
Yu, Huiming [1 ]
Williams, Ken [1 ]
Zhan, Justin [1 ]
Yuan, Xiaohong [1 ]
机构
[1] North Carolina A&T State Univ, Dept Comp Sci, Greensboro, NC 27401 USA
关键词
cloud computing security; fuzzy Likert system; assessment;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Cloud computing offers on-demand scalable resources and IT-based solutions without the need to invest in new infrastructure or train new personnel. Despite its economic advantages, cloud computing has faced scrutiny regarding security risks involved with allowing sensitive data to be controlled and handled by third-party, off-site vendors. Many businesses with interest in using cloud services do not have a process to assess cloud providers security posture. To aid this issue, the Cloud Security Alliance (CSA) has developed the Consensus Assessments Initiative Questionnaire (CAIQ), which has quickly become an industry-accepted way to document security controls found within cloud services. The CSA CAIQ document provides prospective clients an in-depth look into the security controls of a given cloud service provider (CSP). The assessment process is very complicated because it requires clients to examine over 140 questions spanning over eleven security control categories in CAIQ, answer yes/no followed by explanatory comments related to the corresponding question. How cloud consumers can objectively use the CAIQ to assess CSP security levels becomes an important and urgent problem. A Fuzzy Likert System (FLS) was employed that uses fuzzy logic, Likert scales and decision making technologies to assess the Security Posture Score (SPS) for cloud service providers based on client evaluations of CSP feedback on the CAIQ document and client-defined weights signifying the relative importance of each CAIQ category. The FLS allows clients to numerically evaluate the CSA CAIQ and provides weights for each CAIQ category. Upon doing so, the FLS provides a score indicating the security posture of the given CSP. A one-tailed F-test is used to perform a statistical analysis comparing the standard deviation between 1000 random SPSs calculated with our FLS and a traditional weighted-average system. Experimental results indicate that the null hypothesis, which states that the two standard deviations are the same, can be rejected in favor of the alternate hypothesis, thus claiming that with 95% confidence there is a significant difference between scoring methods.
引用
收藏
页码:103 / 110
页数:8
相关论文
共 50 条
  • [1] Assessing Privacy Capabilities of Cloud Service Providers
    del Alamo, J. M.
    Trapero, R.
    Martin, Y. S.
    Yelmo, J. C.
    Suri, N.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (11) : 3634 - 3641
  • [2] Holistic Framework of Security Management for Cloud Service Providers
    Zhao, Gang
    2012 10TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2012, : 852 - 856
  • [3] SECURITY OF REAL TIME CLOUD SERVICE PROVIDERS: A SURVEY
    Joseph, Allen Oommen
    Kathrine, G. Jaspher W.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [4] Towards quantification and evaluation of security of Cloud Service Providers
    Halabi, Talal
    Bellaiche, Martine
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 55 - 65
  • [5] Towards performance evaluation of cloud service providers for cloud data security
    Ramachandran, Muthu
    Chang, Victor
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 618 - 625
  • [6] Cloud native security and the security posture of cloud resources
    Tejero, Hector
    Electronics World, 2023, 128 (2029):
  • [7] Cloud Computing Service Security and Access: From the Providers and Customers' Perspective
    Zhao, Xianghui
    Liu, Hui
    Yi, Jin
    Tian, Wen
    Luo, Ning
    Ye, Lin
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 379 - 383
  • [8] Improve Security over Multiple Cloud Service Providers for Resource Allocation
    Surbiryala, Jayachander
    Agrawal, Bikash
    Rong, Chunming
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 145 - 148
  • [9] Security Evaluation of Cloud Service Providers Using Third Party Auditors
    Rizvi, Syed S.
    Bolish, Trent A.
    Pfeffer, Joseph R., III
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [10] Assessing the adoption of security policies by developers in terraform across different cloud providers
    Verdet, Alexandre
    Hamdaqa, Mohammad
    Da Silva, Leuson
    Khomh, Foutse
    EMPIRICAL SOFTWARE ENGINEERING, 2025, 30 (03)