Data Analysis of Cloud Security Alliance's Security, Trust & Assurance Registry

被引:2
|
作者
Sen, Amartya [1 ]
Madria, Sanjay [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
Cloud Computing; Data Analyses; CSA STAR; Risk Assessment;
D O I
10.1145/3154273.3154343
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of clients applications on the cloud platforms has been of great interest. Security concerns associated with cloud computing arc improving in both the domains; security issues faced by cloud providers and security issues faced by clients. However, security concerns still remain in domains like cloud auditing and migrating application components to cloud to make the process more secure and cost-efficient. To an extent, this can be attributed to a lack of detailed information being publicly present about the cloud platforms and their security policies. A resolution in this regard can be found in Cloud Security Alliance's Security, Trust, and Assurance Registry (STAR) which documents the security controls provided by popular cloud computing offerings. In this paper, we perform some descriptive analysis on STAR data in an attempt to comprehend the information publicly presented by different cloud providers. It is to help clients in more effectively searching and analyzing the required security information they need fir the decision making process for hosting their applications on cloud. Based on the analysis, we outline some augmentations that can be made to STAR as well as certain specific design improvements for a cloud migration risk assessment framework.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A security architecture for cloud computing alliance
    Jun Z.
    Jun, Zhao (hyzhaojun@126.com), 2017, Bentham Science Publishers (10): : 195 - 201
  • [2] From Security to Assurance in the Cloud: A Survey
    Ardagna, Claudio A.
    Asal, Rasool
    Damiani, Ernesto
    Quang Hieu Vu
    ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [3] An Analysis on Data Accountability and Security in Cloud
    Hande, Shital A.
    Mane, Sunil B.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 713 - 717
  • [4] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [5] A Comparative Analysis on Cloud Data Security
    Varghese, Saira
    Vigila, S. Maria Celestin
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 495 - 498
  • [6] Risk Assessment for Big Data in Cloud: Security, Privacy and Trust
    Ali, Hazirah Bee Bt Yusof
    Abdullah, Lili Marziana Bt
    Kartiwi, Mira
    Nordin, Azlin
    PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 63 - 67
  • [7] Security Assurance of (Multi-)Cloud Application with Security SLA Composition
    Rak, Massimiliano
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 786 - 799
  • [8] Trust Model for Computing Security of Cloud
    Rathi, Snehal R.
    Kolekar, Vikas K.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [9] Data Security and the Cloud
    Byington, J. Ralph
    Mcgee, Jo Ann
    JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2014, 25 (05): : 41 - 44
  • [10] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292