Cloud Security - A Semantic Approach in End to End Security Compliance

Authors

  • Venkata Naga Satya Surendra Chimakurthi Sr. Technical Lead, EBA-Ventures-Digital Asset Management (DAM) Solutions, Cognizant Technology Solutions, Dallas, USA

DOI:

https://doi.org/10.18034/ei.v5i2.586

Keywords:

Cloud computing, cloud security, Security compliance, SaaS

Abstract

Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.

Downloads

Download data is not yet available.

References

Amin, R., & Manavalan, M. (2017). Modeling Long Short-Term Memory in Quantum Optical Experiments. International Journal of Reciprocal Symmetry and Physical Sciences, 4, 6–13. https://doi.org/10.5281/zenodo.5633992

Aslam, B. N., Mishra, R., and Thombare, S. (2015). Enhancement of Cloud Security through Scheduled Hiding of Data. International Journal of Computer Engineering and Technology (IJCET), 6(3), 24-32

Cloud Security Alliance. (2013). The Notorious Nine: Cloud Computing Top Threats in 2013, p8-p21.

CSA (2014). CSA security Guidance, v3.

Manavalan, M. (2016). Biclustering of Omics Data using Rectified Factor Networks. International Journal of Reciprocal Symmetry and Physical Sciences, 3, 1–10. https://doi.org/10.5281/zenodo.5633990

Manavalan, M., & Bynagari, N. B. (2015). A Single Long Short-Term Memory Network can Predict Rainfall-Runoff at Multiple Timescales. International Journal of Reciprocal Symmetry and Physical Sciences, 2, 1–7. https://doi.org/10.5281/zenodo.5622588

Manavalan, M., & Ganapathy, A. (2014). Reinforcement Learning in Robotics. Engineering International, 2(2), 113-124. https://doi.org/10.18034/ei.v2i2.572

Mather, T., Kumarswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly Media.

Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing, (Special Publication 800-145).

NIST. (2011). NIST Cloud Computing Reference Architecture.

Ramgovind, S.; Eloff, M.M.; Smith, E., (2010). The management of security in Cloud computing. Information Security for South Africa (ISSA), pp.1,7, 2-4.

Subashini, S. & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11

Taniya. (2013). Introduction to Cloud Security, International Journal of Electronics and Communication Engineering & Technology (IJECET), 4(7), 252-260.

--0--

Downloads

Published

2017-12-31

Issue

Section

Peer Reviewed Articles

How to Cite

Cloud Security - A Semantic Approach in End to End Security Compliance. (2017). Engineering International, 5(2), 97-106. https://doi.org/10.18034/ei.v5i2.586

Similar Articles

1-10 of 31

You may also start an advanced similarity search for this article.