Title :
Systematic parameters vs. SLAs for security in cloud computing
Author :
Bohlol, Nahid ; Safari, Zohreh
Author_Institution :
Dept. of Inf. Technol., Univ. of Malek Ashtar, Tehran, Iran
Abstract :
Cloud computing is an emerging technology that over the internet provides services such as computing infrastructure, network services, applications, business processes, etc. The biggest concern is the security in the cloud computing. Since many solutions provided to secure cloud but since have identified cloud security requirements sporadically and confine could not improve cloud security problems to some extent. In this paper, we review cloud security requirements that done between client and server high level of security agreements. In addition, we classified them separately and mapping them parameters such as authentication, encryption, event viewer, etc. guaranteed security it systematically. Due to the lack of systematic methods for ensuring the security of cloud environment, it is expected researchers, designers and companies offering cloud services should use from the operational results in line with increase the quality and quantity of services.
Keywords :
client-server systems; cloud computing; cryptography; message authentication; SLA; authentication; business processes; client-server; cloud computing; cloud security requirements; computing infrastructure; encryption; event viewer; network services; security agreements; service level agreement; systematic parameters; Cloud computing; Hardware; Organizations; Reliability; Security; Servers; Software as a service; Cloud Computing; Security Parameters; Service Level Agreement (SLA); System Security;
Conference_Titel :
e-Commerce in Developing Countries: With focus on e-Business (ECDC), 2015 9th International Conference on
Conference_Location :
Isfahan
Print_ISBN :
978-1-4799-8653-8
DOI :
10.1109/ECDC.2015.7156324