Security SLAs for Cloud Services: Hadoop Case Study

Author(s):  
Massimo Ficco ◽  
Massimiliano Rak
Keyword(s):  
Author(s):  
Muthu Ramachandran

This real-world case study has been used to demonstrate the best practices on business process modelling and component based design for developing cloud services with Build Security In (BSI). BSI techniques, strategies, and processes presented in this article are general systems security principles and are applicable for both a cloud environment and traditional environment (non-cloud environment). The significant contribution of this research is to illustrate the application of the extended system security method known as SysSQUARE to elicit security requirements, identify security threats of data, as well as integrating build-in security techniques by modelling and simulating business processes upfront in the systems development life cycle.


Author(s):  
Beniamino Di Martino ◽  
Giuseppina Cretella ◽  
Antonio Esposito ◽  
Graziella Carta

passer ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 187-193
Author(s):  
Nigar Mahmoud Shafiq ◽  
Mohammed Y. Shakor

The global spread of Covid-19 has enhanced the adoption of virtual education and the use of technology in order to reduce the risk of contagion. Recently, the academics have turn out to be more technology-orientated and the educational establishments continue to seek opportunities in order to adopt an environment where all researchers could have access to high-quality scientific resources at anytime and anywhere in the world. Cloud computing is a model, which provides the users with services and application software on-demand, using the Internet. While the use of cloud computing applications is growing, there are ongoing research challenges related to guaranteeing security, privacy and the integration of the cloud applications. To the extent of our knowledge, the present study is the first from this type to thoroughly present the impacts of the COVID-19 pandemic on cloud computing environment in higher education institutions in Iraqi universities. This study will critically analysis the views of the faculty staff and researchers in Iraqi universities on cloud computing. It also tries to take a quick look at how Iraqi university staff responded to the epidemic in terms of research activities. The results shows that about 99% of the respondents considered the cloud applications to have great role in encouraging the research works in their institutes. Concerning the benefits of cloud services, the availability and saving cost were selected as most important factors that encouraging the adoption of cloud services. On the other hand, issues related to performance, lack of user control were selected as major problems in applying cloud services in Iraqi institutions Finally, it can be concluding that reducing the risks of the security, authorization, control and providing better performance of cloud services can enhance the use of cloud applications by researchers at Iraqi universities.


2018 ◽  
Vol 38 ◽  
pp. 50-64 ◽  
Author(s):  
Fahad F. Alruwaili ◽  
T. Aaron Gulliver
Keyword(s):  

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 462 ◽  
Author(s):  
Gao Tilei ◽  
Li Tong ◽  
Yang Ming ◽  
Jiang Rong

The popularity of cloud computing has made cloud services gradually become the leading computing model nowadays. The trustworthiness of cloud services depends mainly on construction processes. The trustworthiness measurement of cloud service construction processes (CSCPs) is crucial for cloud service developers. It can help to find out the causes of failures and to improve the development process, thereby ensuring the quality of cloud service. Herein, firstly, a trustworthiness hierarchy model of CSCP was proposed, and the influential factors of the processes were identified following the international standard ISO/IEC 12207 of the software development process.Further, a method was developed combined with the theory of information entropy and the concept of trustworthiness. It aimed to calculate the risk uncertainty and risk loss expectation affecting trustworthiness. Also, the trustworthiness of cloud service and its main construction processes were calculated. Finally, the feasibility of the measurement method were verified through a case study, and through comparing with AHP and CMM/CMMI methods, the advantages of this method were embodied.


Sign in / Sign up

Export Citation Format

Share Document