Towards Achieving Data Security with the Cloud Computing Adoption Framework

计算机科学 云计算 计算机安全 云安全计算 数据安全 防火墙(物理) 保安服务 入侵检测系统 访问控制 加密 信息安全 操作系统 业务 增值(金融) 施瓦西半径 财务 带电黑洞
作者
Victor Chang,Muthu Ramachandran
出处
期刊:IEEE Transactions on Services Computing [Institute of Electrical and Electronics Engineers]
卷期号:9 (1): 138-151 被引量:272
标识
DOI:10.1109/tsc.2015.2491281
摘要

Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users' data has the highest priority as well as concern. We believe this can only be able to achieve with an approach that is systematic, adoptable and well-structured. Therefore, this paper has developed a framework known as Cloud Computing Adoption Framework (CCAF) which has been customized for securing cloud data. This paper explains the overview, rationale and components in the CCAF to protect data security. CCAF is illustrated by the system design based on the requirements and the implementation demonstrated by the CCAF multi-layered security. Since our Data Center has 10 petabytes of data, there is a huge task to provide real-time protection and quarantine. We use Business Process Modeling Notation (BPMN) to simulate how data is in use. The use of BPMN simulation allows us to evaluate the chosen security performances before actual implementation. Results show that the time to take control of security breach can take between 50 and 125 hours. This means that additional security is required to ensure all data is well-protected in the crucial 125 hours. This paper has also demonstrated that CCAF multi-layered security can protect data in real-time and it has three layers of security: 1) firewall and access control; 2) identity management and intrusion prevention and 3) convergent encryption. To validate CCAF, this paper has undertaken two sets of ethical-hacking experiments involved with penetration testing with 10,000 trojans and viruses. The CCAF multi-layered security can block 9,919 viruses and trojans which can be destroyed in seconds and the remaining ones can be quarantined or isolated. The experiments show although the percentage of blocking can decrease for continuous injection of viruses and trojans, 97.43 percent of them can be quarantined. Our CCAF multi-layered security has an average of 20 percent better performance than the single-layered approach which could only block 7,438 viruses and trojans. CCAF can be more effective when combined with BPMN simulation to evaluate security process and penetrating testing results.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
黑妖完成签到,获得积分10
刚刚
水穷云起完成签到,获得积分10
刚刚
ZJY34359完成签到,获得积分10
1秒前
1秒前
1秒前
星星又累发布了新的文献求助10
2秒前
Hemin完成签到,获得积分10
2秒前
amity发布了新的文献求助10
3秒前
3秒前
DQY发布了新的文献求助10
3秒前
中科院化学完成签到,获得积分10
3秒前
3秒前
信念发布了新的文献求助30
3秒前
4秒前
红星路吃饼子的派大星完成签到 ,获得积分10
4秒前
小脚丫完成签到,获得积分10
5秒前
ZJY34359发布了新的文献求助10
5秒前
6秒前
舒适店员完成签到 ,获得积分10
6秒前
alex发布了新的文献求助10
7秒前
ganzhongxin完成签到,获得积分10
7秒前
8秒前
款款完成签到 ,获得积分10
8秒前
8秒前
8秒前
zhouzy完成签到,获得积分10
9秒前
鼓励男孩发布了新的文献求助10
9秒前
见雨鱼完成签到,获得积分10
9秒前
无花果应助刘倩雯采纳,获得10
10秒前
10秒前
10秒前
kookery完成签到,获得积分10
10秒前
数值分析完成签到 ,获得积分10
11秒前
CodeCraft应助sun采纳,获得10
11秒前
晨雾完成签到 ,获得积分10
11秒前
12秒前
温暖寻云发布了新的文献求助10
13秒前
Elysia发布了新的文献求助10
13秒前
完美世界应助张醒醒采纳,获得10
13秒前
小白发布了新的文献求助10
14秒前
高分求助中
Chinesen in Europa – Europäer in China: Journalisten, Spione, Studenten 500
Arthur Ewert: A Life for the Comintern 500
China's Relations With Japan 1945-83: The Role of Liao Chengzhi // Kurt Werner Radtke 500
Two Years in Peking 1965-1966: Book 1: Living and Teaching in Mao's China // Reginald Hunt 500
Epigenetic Drug Discovery 500
Knowledge management in the fashion industry 300
The world according to Garb 300
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3816509
求助须知:如何正确求助?哪些是违规求助? 3359946
关于积分的说明 10406042
捐赠科研通 3078020
什么是DOI,文献DOI怎么找? 1690472
邀请新用户注册赠送积分活动 813786
科研通“疑难数据库(出版商)”最低求助积分说明 767857