Title :
Cloud computing: Security model comprising governance, risk management and compliance
Author :
Al-Anzi, Fawaz S. ; Yadav, Santosh Kumar ; Soni, Jignesh
Author_Institution :
Comput. Eng. Dept., Kuwait Univ., Safat, Kuwait
Abstract :
Cloud security is a broad topic and any combination of policies, technologies, and controls to protect data, infrastructure and services from possible attacks. Security requirements in the cloud are very much different from traditional environments. Since cloud has a dynamic nature with small customer ownership of infrastructure, has broken traditional security architecture. We believe Security should be the joint responsibility of service provider and organization, no matter what kind of service model you are using. Security will be more effective when layered at each level of cloud technology and integrated with a common management platform. There is a hype of cloud in the market, but companies are not still ready to put their business in the cloud just because of security is prominent issues which does not grow the cloud computing business in the market. We focus on the area, i.e. application security, information security, infrastructure security and security monitoring by giving our own security model. This model surely protects our organizational physical as well as virtual assets by providing better security options.
Keywords :
cloud computing; conformance testing; data protection; risk management; application security; cloud computing; cloud computing business; cloud security model; common management platform; compliance management; customer ownership; data protection; dynamic cloud technology; information security; infrastructure protection; infrastructure security; organizational physical asset protection; organizational virtual asset protection; risk management; security governance; security monitoring; service model; service protection; service provider; Cloud computing; Computational modeling; Educational institutions; Organizations; Risk management; Security; Cloud computing; Threat; security;
Conference_Titel :
Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on
Conference_Location :
New Delhi
Print_ISBN :
978-1-4799-4675-4
DOI :
10.1109/ICDMIC.2014.6954232