The FedRAMP cloud computing security requirements

2017 ◽  
pp. 269-377
Author(s):  
Matthew Metheny
Author(s):  
Baldev Singh

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.


2014 ◽  
Vol 511-512 ◽  
pp. 1196-1200
Author(s):  
Jian Gang Tang

Cloud computing is an open structure which have complexity, on-demand services, virtualization, resource pooling, rapid elasticity and multi-tenant architecture, etc. The security issues have become a bottleneck restricting the development of cloud computing. This paper analyzes the characteristics of cloud computing services, security requirements and security issues, given security strategies and a cloud computing model. It requires the use of cloud computing architecture data centers, virtualization platforms, cloud services, cloud terminal interfaces and cloud terminal to establish a secure cloud computing model. It needs considerations from prevention, surveillance and response to ensure the implementation and management. Cloud computing security is not just technical issues, it also involves many standardization, regulatory approach, laws and regulations and follow the existing security best practices can enhance the security of cloud computing.


2020 ◽  
Vol 1 (2) ◽  
pp. 108-115 ◽  
Author(s):  
Tanweer Alam

The concept of Cloud Computing has been distinguished as one of the major computing models in recent years. Cloud computing has become a great innovation that has important consequences not just for services on the internet but also for the entire Information technology (IT) market. Its emergence aims to optimize on-demand technology, hardware and information provisioning as a service, reaching the economy of scale in the distribution and operation of IT strategies. A great deal of cloud computing research has been concerned over some obstacles and challenges that rely upon behind the lure of cloud computing. Security has been always raised as one of the most critical issues of cloud computing where resolving such an issue would result in constant growth in the use and popularity of the cloud. Security requirements represent a major issue that has to be met in order of easing some of these obstacles. This article presents the role of cloud computing in the IT sectors.


2022 ◽  
Vol 1216 (1) ◽  
pp. 012001
Author(s):  
G R Tsochev ◽  
R I Trifonov

Abstract Cloud computing is a new technology that is undergoing tremendous development today. People who use it are not able to separate the reasonable from the unreasonable arguments that come with the security requirements in the cloud. The claim that cloud computing is hereditarily insecure is as absurd as the claim that cloud computing does not create new security problems. Cloud computing is a way to dynamically increase resources without the need for in-depth knowledge of a brand new infrastructure, without training new workers or designing new software solutions. The article aims to analyse the different cloud security issues and models of cloud architectures. Some of the main problems with security in virtualization, concerns about storing data in the cloud and the assessment of risk tolerance in cloud computing are presented. Legal and regulatory issues for the protection of personal data are addressed.


Sign in / Sign up

Export Citation Format

Share Document