Cloud Security Proposed and Demonstrated by Cloud Computing Adoption Framework

Muthu Ramachandran, Victor Chang

2014

Abstract

This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and feature for CCAF. The CCAF implemen-tations have been illustrated to show how to enforce security and ensure all suers are protected. It provides three layers of security in Access control and firewalls; Intrusion Detection Systems (IDS) and Prevention System; and Isolation Management to maintain a high level of Cloud security. CCAF security offers a framework to serve the Cloud community. The key characteristics have been explained. We will develop more service updates and demonstrations for our forthcoming projects to ensure that CCAF security can provide more use cases and added value to the Cloud community.

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. (2010), Above the Clouds: A Berkeley View of Cloud computing. Communications of the ACM, 53(4), 50-58.
  2. Caminao Project, Caminao's Way: Do systems know how symbolic they are? Modelling Systems Engineering Project, http://caminao.wordpress.com/overview/ ?goback=%2Egde_3731775_member_251475288, accessed on 21st June, (2013).
  3. Chang, V., Walters, R. J., & Wills, G., Cloud Storage and Bioinformatics in a private cloud deployment: Lessons for Data Intensive research, Springer: CLOSER 2012, CCIS 367, pp. 245-264, (2013).
  4. Chang, V., Business Intelligence as Service in the Cloud, Future Generation Computer Systems, (2014).
  5. Chang, V., Walters, R. J., & Wills, G., The development that leads to the Cloud Computing Business Framework. International Journal of Information Management, 33(3), pp 524-538, June, (2013).
  6. Chang, V., Brain Segmentation - A Case study of Biomedical Cloud Computing for Education and Research. In, Learning Technologies Workshop, Higher Education Academy (HEA), University of Greenwich, (2013).
  7. Marston, S., Li, Z., Bandyopadhyay, S. and Zhang, J. and Ghalsasi, A., Cloud computing - The business perspective, Decision Support Systems, Elsevier, 51(1): pp 176-189, (2011).
  8. Mead, N.R., et. al., Security Quality Requirements Engineering (SQUARE) Methodology, TECHNICAL REPORT, CMU/SEI-2005-TR-009, (2005).
  9. Ramachandran, M., Software components for cloud computing architectures and applications, Springer, Mahmmood, Z and Hill, R (eds.), (2011).
  10. Ramachandran, M., Software Security Engineering: Design and Applications, Nova Science Publishers, New York, USA, 2011.ISBN: 978-1-61470-128-6, (2011).
  11. Tondel, I. A et al., Security requirements for rest of us: a survey, IEEE Software, Special Issue on Security and Agile requirement engineer-ing methods, Jan/Feb. (2008).
  12. Vouk, M. A., Cloud Computing - Issues, Research and Implementations, Journal of Computing and Information Technology - CIT 16, page 235-246, Volume 4, (2008).
Download


Paper Citation


in Harvard Style

Ramachandran M. and Chang V. (2014). Cloud Security Proposed and Demonstrated by Cloud Computing Adoption Framework . In Proceedings of the International Workshop on Emerging Software as a Service and Analytics - Volume 1: ESaaSA, (CLOSER 2014) ISBN 978-989-758-026-0, pages 62-70. DOI: 10.5220/0004984000620070


in Bibtex Style

@conference{esaasa14,
author={Muthu Ramachandran and Victor Chang},
title={Cloud Security Proposed and Demonstrated by Cloud Computing Adoption Framework},
booktitle={Proceedings of the International Workshop on Emerging Software as a Service and Analytics - Volume 1: ESaaSA, (CLOSER 2014)},
year={2014},
pages={62-70},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004984000620070},
isbn={978-989-758-026-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Workshop on Emerging Software as a Service and Analytics - Volume 1: ESaaSA, (CLOSER 2014)
TI - Cloud Security Proposed and Demonstrated by Cloud Computing Adoption Framework
SN - 978-989-758-026-0
AU - Ramachandran M.
AU - Chang V.
PY - 2014
SP - 62
EP - 70
DO - 10.5220/0004984000620070