Data Analysis of Cloud Security Alliance's Security, Trust & Assurance Registry

被引:2
|
作者
Sen, Amartya [1 ]
Madria, Sanjay [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
Cloud Computing; Data Analyses; CSA STAR; Risk Assessment;
D O I
10.1145/3154273.3154343
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of clients applications on the cloud platforms has been of great interest. Security concerns associated with cloud computing arc improving in both the domains; security issues faced by cloud providers and security issues faced by clients. However, security concerns still remain in domains like cloud auditing and migrating application components to cloud to make the process more secure and cost-efficient. To an extent, this can be attributed to a lack of detailed information being publicly present about the cloud platforms and their security policies. A resolution in this regard can be found in Cloud Security Alliance's Security, Trust, and Assurance Registry (STAR) which documents the security controls provided by popular cloud computing offerings. In this paper, we perform some descriptive analysis on STAR data in an attempt to comprehend the information publicly presented by different cloud providers. It is to help clients in more effectively searching and analyzing the required security information they need fir the decision making process for hosting their applications on cloud. Based on the analysis, we outline some augmentations that can be made to STAR as well as certain specific design improvements for a cloud migration risk assessment framework.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Analysis of the Use of System Resources for Cloud Data Security
    Horalek, Josef
    Sobeslav, Vladimir
    MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS (MOBIWIS 2018), 2018, 10995 : 101 - 111
  • [42] A Quantitative Analysis of Cloud Users' Satisfaction and Data Security in Cloud Models
    Zardari, Munwar Ali
    Jung, Low Tang
    Zakaria, Nordin
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 42 - 47
  • [43] Data Security and Privacy Assurance for Cloud Computing in Education Based on a Third Party Auditor
    Alim, Endy Sjaiful
    Jin, Hai
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 96 - 97
  • [44] JAPAN-UNITED-STATES SECURITY RELATIONS - AN ALLIANCE OF TRUST
    OKAZAKI, H
    ATLANTIC COMMUNITY QUARTERLY, 1981, 19 (02): : 212 - 217
  • [45] Comparative analysis of trust and security
    Hussain, Farookh Khadeer
    Chang, Elizabeth
    Dillon, Tharam S.
    2006 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI 2006), PROCEEDINGS, 2006, : 1019 - +
  • [46] Trust Analysis Method of Process Behavior for Data Security Exchange
    Sun, Yi
    Chen, Xingyuan
    Du, Xuehui
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2162 - 2167
  • [47] Big Data Services Security and Security Challenges in Cloud Environment
    Alsufyani, Raed
    Jama, Khursand
    Yao, Yulin
    Ramachandran, Muthu
    Chang, Victor
    IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, : 461 - 468
  • [48] Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE's Security
    Dalskov, Anders P. K.
    Orlandi, Claudio
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 343 - 355
  • [49] Failure analysis for hardware assurance and security
    Rahman, M. Tanjidur
    Asadizanjani, Navid
    Electronic Device Failure Analysis, 2019, 21 (03): : 16 - 24
  • [50] Trust Enhanced Security for Tenant Transactions in the Cloud Environment
    Tupakula, Udaya
    Varadharajan, Vijay
    COMPUTER JOURNAL, 2015, 58 (10): : 2388 - 2403