Security Evaluation in Cloud

被引:0
|
作者
Mirkovic, Orlan [1 ]
机构
[1] Ericsson Nikola Tesla, Zagreb, Croatia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While creating the cloud security architecture the opportunity arises to apply IT best practices and the principles of security for a particular domain and to solve a specific set of issues related to security, measurability being one of the hardest. The article explains a measurable model for a cloud by providing a set of controls and defining metrics principles. Further this article enlists the set of tools that can be used to evaluate the security of private, public, community or hybrid cloud.
引用
收藏
页码:1088 / 1093
页数:6
相关论文
共 50 条
  • [31] Empirical evaluation of a cloud computing information security governance framework
    Rebollo, Oscar
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Mouratidis, Haralambos
    INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 : 44 - 57
  • [32] Security in the Cloud
    Anthes, Gary
    COMMUNICATIONS OF THE ACM, 2010, 53 (11) : 16 - 18
  • [33] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [34] Cloud computing security evaluation and countermeasure based on AHP-fuzzy comprehensive evaluation
    Yang A.-M.
    Gao F.
    Bian M.-H.
    Yang S.-L.
    2016, Editorial Board of Journal on Communications (37): : 104 - 110
  • [35] Cloud Security Can the cloud be secured?
    Karnad, Kiran
    Nagenthram, Saravanan
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 208 - 210
  • [36] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [37] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [38] Research on the Construction of Cloud ERP Ecosystem Security Evaluation Index System
    Wang, Zhujun
    Su, Qin
    Fang, Yue
    FUZZY SYSTEMS AND DATA MINING VI, 2020, 331 : 580 - 588
  • [39] Experimental Evaluation of Network Telemetry Anonymization for Cloud Based Security Analysis
    Dara, Sashank
    Gopularam, Bhanu Prakash
    Muralidhara, V. N.
    Nalini, N.
    2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2016, : 1 - 7
  • [40] Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0
    Schluga, Oliver
    Bauer, Elisabeth
    Bicaku, Ani
    Maksuti, Silia
    Tauber, Markus
    Woehrer, Alexander
    CLOSER: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2018, : 392 - 399