Cloud computing adoption framework: A security framework for business clouds

被引:169
作者
Chang, Victor [1 ]
Kuo, Yen -Hung [2 ]
Ramachandran, Muthu [1 ]
机构
[1] Leeds Beckett Univ, Sch Comp Creat Technol & Engn, Leeds, W Yorkshire, England
[2] Inst Informat Ind, Data Analyt Technol & Applicat, Taipei, Taiwan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2016年 / 57卷
关键词
Cloud computing adoption framework (CCAF); OpenStack; CCAF multi-layered security; Security for business clouds;
D O I
10.1016/j.future.2015.09.031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article presents a cloud computing adoption framework (CCAF) security suitable for business clouds. CCAF multilayered security is based on the development and integration of three major security technologies: firewall, identity management, and encryption based on the development of enterprise file sync and share technologies. This article presents the vision, related works, and views on security framework. Core technologies have been explained in detail, and experiments were designed to demonstrate the robustness of the CCAF multilayered security. In penetration testing, CCAF multilayered security could detect and block 99.95% viruses and trojans, and could achieve >= 85% of blocking for 100 h of continuous attack. Detection and blocking took <0.012 s/trojan or virus. A full CCAF multilayered security protection could block all SQL (structured query language) injection, providing real protection to data. CCAF multilayered security did not report any false alarm. All F-measures for CCAF test results were >= 99.75%. The mechanism of blending of CCAF multilayered security with policy, real services, and business activities has been illustrated. Research contributions have been justified and CCAF multilayered security can be beneficial for volume, velocity, and veracity of big data services operated in the cloud. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:24 / 41
页数:18
相关论文
共 33 条
[1]  
[Anonymous], PROPOSED CLOUD COMPU
[2]  
[Anonymous], 2011, 6 INT C
[3]  
[Anonymous], WEB HACKING ATTACKS
[4]  
[Anonymous], ARXIV11084100
[5]   Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples [J].
Antunes, Nuno ;
Vieira, Marco .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) :269-283
[6]  
Baset S. A., 2012, P 3 ACM S CLOUD COMP
[7]   Scalable SQL and NoSQL Data Stores [J].
Cattell, Rick .
SIGMOD RECORD, 2010, 39 (04) :12-27
[8]  
Chang V, 2013, COMM COM INF SC, V367, P245
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]  
Harris M.D., 2008, The business value of IT: Managing risks, optimising performance and measuring results