Title :
Cloud Service Security & application vulnerability
Author :
Murray, Acklyn ; Begna, Geremew ; Nwafor, Ebelechukwu ; Blackstone, Jeremy ; Patterson, Wayne
Author_Institution :
Dept. of Syst. & Comput. Sci., Howard Univ., Washington, DC, USA
Abstract :
Cloud computing is one of today´s most appealing technology areas due to its cost-efficiency and flexibility. However, despite significant interests, deploying cloud computing in an enterprise infrastructure offers significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. This paper discusses security concerns of the three cloud computing models namely “Software as a Service” (SaaS), Platform as a Service” (PaaS) and “Infrastructure as a Service” (IaaS). It also discusses Cloud-based Security Tools currently available today. Under the U.S. Federal Security Requirements for Cloud Security. The paper demonstrated the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP). The paper also discusses Cloud Data Encryption, Homomorphic Encryption and Access Control (Identity Access Management). Finally, this paper talks about cloud applications focusing on select cloud applications. It also looks at some of the known vulnerability issues associated with the applications and also the future of cloud applications.
Keywords :
authorisation; cloud computing; cryptography; FISMA; FedRAMP; Federal Information Security Management Act; Federal Risk and Authorization Management Program; IaaS; PaaS; SaaS; U.S. Federal Security Requirements for Cloud Security; access control; application vulnerability; cloud computing; cloud data encryption; cloud service security; cloud-based security tools; enterprise infrastructure; homomorphic encryption; identity access management; infrastructure-as-a-service; platform-as-a-service; risk planning; risk understanding; software-as-a-service; threats; vulnerabilities; Cloud computing; Computational modeling; Electronic mail; Security; Servers; Software as a service; Data Encryption; FISMA; IaaS; PaaS; SaaS; access control; cloud computing; cryptography; cybersecurity Application Vulnerability;
Conference_Titel :
SoutheastCon 2015
Conference_Location :
Fort Lauderdale, FL
DOI :
10.1109/SECON.2015.7132979