Cloud Environment Controls Assessment Framework

Author(s):  
Bharat Shah

Recent years have seen the rapid growth of on-demand, flexible, low-cost cloud-based information technology services. Government and business organizations around the world have started transforming their traditional in-house data center environments to cloud-based outsourced data centers. This transformation is opening doors to new risks given that the cloud computing delivery models, related services, and technologies are still maturing and evolving. Before deployment, organizations must implement cloud environment assessment methodologies to comply with the applicable standards and regulations. They must evaluate the environment’s quality attributes of Internet connectivity, user access control, privacy and confidentiality, asset protection, multiple platforms locality, availability, reliability, performance, and scalability. The purpose of this chapter is to assist organizations that are considering providing and consuming cloud-based services in developing an assessment plan specific to organizational policies, strategies and their business and applicable legal and regulatory requirements; and assessing the cloud environment controls for infrastructure, platform, and software services.

2015 ◽  
pp. 580-605 ◽  
Author(s):  
Bharat Shah

Recent years have seen the rapid growth of on-demand, flexible, low-cost cloud-based information technology services. Government and business organizations around the world have started transforming their traditional in-house data center environments to cloud-based outsourced data centers. This transformation is opening doors to new risks given that the cloud computing delivery models, related services, and technologies are still maturing and evolving. Before deployment, organizations must implement cloud environment assessment methodologies to comply with the applicable standards and regulations. They must evaluate the environment's quality attributes of Internet connectivity, user access control, privacy and confidentiality, asset protection, multiple platforms locality, availability, reliability, performance, and scalability. The purpose of this chapter is to assist organizations that are considering providing and consuming cloud-based services in developing an assessment plan specific to organizational policies, strategies and their business and applicable legal and regulatory requirements; and assessing the cloud environment controls for infrastructure, platform, and software services.


2013 ◽  
pp. 1822-1847
Author(s):  
Bharat Shah

Recent years have seen the rapid growth of on-demand, flexible, low-cost cloud-based information technology services. Government and business organizations around the world have started transforming their traditional in-house data center environments to cloud-based outsourced data centers. This transformation is opening doors to new risks given that the cloud computing delivery models, related services, and technologies are still maturing and evolving. Before deployment, organizations must implement cloud environment assessment methodologies to comply with the applicable standards and regulations. They must evaluate the environment’s quality attributes of Internet connectivity, user access control, privacy and confidentiality, asset protection, multiple platforms locality, availability, reliability, performance, and scalability. The purpose of this chapter is to assist organizations that are considering providing and consuming cloud-based services in developing an assessment plan specific to organizational policies, strategies and their business and applicable legal and regulatory requirements; and assessing the cloud environment controls for infrastructure, platform, and software services.


2012 ◽  
Vol 3 (2) ◽  
pp. 291-293
Author(s):  
Shruti Jain

As the power of wireless increases, it provides various opportunities for improving services to customers. In today’s era, mobile commerce or M-Commerce has entered almost all the aspects of Business organizations like finance, retails, services, telecommunications and information technology services. This paper discusses the concept of Mobile Commerce. It looks at how the technology of Mobile Commerce has facilitated new business trends. After this there is detailed description of applications of M-Commerce, its advantages & disadvantages. In last finally it throws light on the challenges that are faced by M-Commerce.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Sudha Devi Dorairaj ◽  
Thilagavathy Kaliannan

Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.


2014 ◽  
Vol 984-985 ◽  
pp. 1309-1317 ◽  
Author(s):  
D. Sudha Devi ◽  
K. Thilagavathy ◽  
S. Vaghula Krishnan ◽  
S. Harish ◽  
R. Srinivasan

Cloud Computing is being intended to deliver information technology services based on internet on demand. The benefits of cloud technology are incomparable which takes the information technology into a new dimension. Organizations already invested for their own infrastructure are likely to set up private clouds to reap the benefits of cloud computing technologies. Cloud services are thriving by the open source software OpenStack. In this paper, we aim to introduce the largest open-source cloud operating system OpenStack with a new authentication mechanism. This paper tries to address the challenge of finding legitimate users by introducing One Time Password (OTP) as an authentication mechanism in OpenStack. Replay attacks can be defeated by using One Time Password. The OTP mechanism provides an extra level of protection which makes it extremely difficult for any potential intruder to abuse the recorded password that was already used to log into cloud service. The integration of OTP mechanism into OpenStack allows users to protect their credentials from unauthorized access. Also One Time Password is used to grant access to legitimate users into the cloud environment and to prevent access to malicious users bot attacks.With secured cloud environment users can enjoy lot many benefits of private cloud service.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Sign in / Sign up

Export Citation Format

Share Document