Data Analysis of Cloud Security Alliance's Security, Trust & Assurance Registry

被引:2
|
作者
Sen, Amartya [1 ]
Madria, Sanjay [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
Cloud Computing; Data Analyses; CSA STAR; Risk Assessment;
D O I
10.1145/3154273.3154343
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of clients applications on the cloud platforms has been of great interest. Security concerns associated with cloud computing arc improving in both the domains; security issues faced by cloud providers and security issues faced by clients. However, security concerns still remain in domains like cloud auditing and migrating application components to cloud to make the process more secure and cost-efficient. To an extent, this can be attributed to a lack of detailed information being publicly present about the cloud platforms and their security policies. A resolution in this regard can be found in Cloud Security Alliance's Security, Trust, and Assurance Registry (STAR) which documents the security controls provided by popular cloud computing offerings. In this paper, we perform some descriptive analysis on STAR data in an attempt to comprehend the information publicly presented by different cloud providers. It is to help clients in more effectively searching and analyzing the required security information they need fir the decision making process for hosting their applications on cloud. Based on the analysis, we outline some augmentations that can be made to STAR as well as certain specific design improvements for a cloud migration risk assessment framework.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A Study of Computational Trust Models in Cloud Security
    Thakare, Vaishali Ravindra
    Singh, John K.
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2021, 13 (03) : 1 - 11
  • [22] A Trust Model for Security and Privacy in Cloud Services
    Himanshu, Gupta
    Afewou, Kodjo Desire
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 443 - 450
  • [23] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [24] Japan's New Security Partnerships: Beyond the Security Alliance
    Envall, H. D. P.
    JOURNAL OF JAPANESE STUDIES, 2020, 46 (02): : 450 - 454
  • [25] Data Recovery and Security in Cloud
    Surbiryala, Jayachander
    Rong, Chunming
    2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA), 2018, : 126 - 130
  • [26] Trust in Data Security Protocols and Knowledge of Privacy and Security Technology
    Lyon, Gregory
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 29 - 37
  • [27] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [28] Data Security Frameworks In Cloud
    Devi, T.
    Ganesan, R.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [29] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [30] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993