Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security

被引:2
|
作者
Di Giulio, Carlo [1 ]
Sprabery, Read [1 ]
Kamhoua, Charles [2 ]
Kwiat, Kevin [2 ]
Campbell, Roy H. [1 ]
Bashir, Masooda N. [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] Air Force Res Lab, Wright Patterson AFB, OH USA
关键词
FedRAMP; ISO; Certification; Standard; Framework; Cloud; Privacy; Security;
D O I
10.1145/3018896.3025169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The great diffusion of cloud computing applications and services in the last years has brought new threats to security of information. 1 IT Certification and authorization mechanisms try to provide assurance against those threats by leveraging high security standards and controls. Two examples of such certification based on IT security controls are ISO/IEC 27001 and FedRAMP. While these two certifications largely share their scope it is important to note that ISO is a standardization adopted worldwide since 2005 whereas FedRAMP was developed in 2012 specifically for US Government Cloud Service Providers. New frameworks, however, are not always more effective than earlier ones, especially in the fast-moving world of cloud computing where IT security standards need to be constantly updated. This study offers an overview of adequacy and completeness of ISO/IEC 27001 and FedRAMP, bringing to question the level of protection that they provide by comparing them to each other and evaluating both in terms of known threats to cloud computing. The study identifies weaknesses in the certification build process and highlights necessary improvements.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Cloud Service Security & Application Vulnerability
    Murray, Acklyn
    Begna, Geremew
    Nwafor, Ebelechukwu
    Blackstone, Jeremy
    Patterson, Wayne
    IEEE SOUTHEASTCON 2015, 2015,
  • [22] Customized Network Security for Cloud Service
    He, Jin
    Ota, Kaoru
    Dong, Mianxiong
    Yang, Laurence T.
    Fan, Mingyu
    Wang, Guangwei
    Yau, Stephen S.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (05) : 801 - 814
  • [23] Improve Security over Multiple Cloud Service Providers for Resource Allocation
    Surbiryala, Jayachander
    Agrawal, Bikash
    Rong, Chunming
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 145 - 148
  • [24] Security as a Service Model for Cloud Environment
    Varadharajan, Vijay
    Tupakula, Udaya
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 60 - 75
  • [25] A SECURED CLOUD STORAGE TECHNIQUE TO IMPROVE SECURITY IN CLOUD INFRASTRUCTURE
    SenthilKumar, M.
    Kumar, M.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 97 - 102
  • [26] Virtualized Security Function Placement for Security Service Chaining in Cloud
    Wu, Hongjing
    Zhang, Yan
    Yang, Huiran
    Yu, Guangxi
    Cao, Jiuyue
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 628 - 637
  • [27] Cloud native security and the security posture of cloud resources
    Tejero, Hector
    Electronics World, 2023, 128 (2029):
  • [28] Comparison of Security Algorithms in Cloud Computing
    Devkota, Dinesh
    Ghimire, Prashant
    Burris, John
    Alkadi, Ihssan
    2015 IEEE AEROSPACE CONFERENCE, 2015,
  • [29] Cloud Security Frameworks A Comparison to Evaluate Cloud Control Standards
    Hegde, Taarika
    Gangl, Josh
    Babenko, Stanislav
    Coffman, Joel
    16TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC 2023, 2023,
  • [30] Towards performance evaluation of cloud service providers for cloud data security
    Ramachandran, Muthu
    Chang, Victor
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 618 - 625