Home > Research > Publications & Outputs > Security assurance assessment methodology for h...

Associated organisational unit

Links

Text available via DOI:

View graph of relations

Security assurance assessment methodology for hybrid clouds

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Security assurance assessment methodology for hybrid clouds. / Hudic, Aleksandar; Smith, Paul; Weippl, Edgar R.
In: Computers and Security, Vol. 70, 30.09.2017, p. 723-743.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Hudic, A, Smith, P & Weippl, ER 2017, 'Security assurance assessment methodology for hybrid clouds', Computers and Security, vol. 70, pp. 723-743. https://doi.org/10.1016/J.COSE.2017.03.009

APA

Vancouver

Hudic A, Smith P, Weippl ER. Security assurance assessment methodology for hybrid clouds. Computers and Security. 2017 Sept 30;70:723-743. Epub 2017 Sept 19. doi: 10.1016/J.COSE.2017.03.009

Author

Hudic, Aleksandar ; Smith, Paul ; Weippl, Edgar R. / Security assurance assessment methodology for hybrid clouds. In: Computers and Security. 2017 ; Vol. 70. pp. 723-743.

Bibtex

@article{1f1afc1d32b3463498926e4f6258552f,
title = "Security assurance assessment methodology for hybrid clouds",
abstract = "The emergence of the cloud computing paradigm has altered the delivery models for ICT services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced transparency and control over a user's information and services. In addition, there are a number of well-understood security and privacy challenges that are specific to this environment. These drawbacks are particularly problematic to operators of critical information infrastructures that want to leverage the benefits of cloud. To improve transparency and provide assurances that measures are in place to ensure security, novel approaches to security evaluation are needed. To evaluate the security of services that are deployed in the cloud requires an evaluation of complex multi-layered systems and services, including their interdependencies. This is a challenging task that involves significant effort, in terms of both computational and human resources. With these challenges in mind, we propose a novel security assessment methodology for analysing the security of critical services that are deployed in cloud environments. Our methodology offers flexibility, in that tailored policy-driven security assessments can be defined based on a user's requirements, relevant standards, policies, and guidelines. We have implemented and evaluated a system that supports online assessments using our methodology, which acquires and processes large volumes of security-related data without affecting the performance of the services in a cloud environment.",
author = "Aleksandar Hudic and Paul Smith and Weippl, {Edgar R.}",
year = "2017",
month = sep,
day = "30",
doi = "10.1016/J.COSE.2017.03.009",
language = "English",
volume = "70",
pages = "723--743",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Ltd",

}

RIS

TY - JOUR

T1 - Security assurance assessment methodology for hybrid clouds

AU - Hudic, Aleksandar

AU - Smith, Paul

AU - Weippl, Edgar R.

PY - 2017/9/30

Y1 - 2017/9/30

N2 - The emergence of the cloud computing paradigm has altered the delivery models for ICT services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced transparency and control over a user's information and services. In addition, there are a number of well-understood security and privacy challenges that are specific to this environment. These drawbacks are particularly problematic to operators of critical information infrastructures that want to leverage the benefits of cloud. To improve transparency and provide assurances that measures are in place to ensure security, novel approaches to security evaluation are needed. To evaluate the security of services that are deployed in the cloud requires an evaluation of complex multi-layered systems and services, including their interdependencies. This is a challenging task that involves significant effort, in terms of both computational and human resources. With these challenges in mind, we propose a novel security assessment methodology for analysing the security of critical services that are deployed in cloud environments. Our methodology offers flexibility, in that tailored policy-driven security assessments can be defined based on a user's requirements, relevant standards, policies, and guidelines. We have implemented and evaluated a system that supports online assessments using our methodology, which acquires and processes large volumes of security-related data without affecting the performance of the services in a cloud environment.

AB - The emergence of the cloud computing paradigm has altered the delivery models for ICT services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced transparency and control over a user's information and services. In addition, there are a number of well-understood security and privacy challenges that are specific to this environment. These drawbacks are particularly problematic to operators of critical information infrastructures that want to leverage the benefits of cloud. To improve transparency and provide assurances that measures are in place to ensure security, novel approaches to security evaluation are needed. To evaluate the security of services that are deployed in the cloud requires an evaluation of complex multi-layered systems and services, including their interdependencies. This is a challenging task that involves significant effort, in terms of both computational and human resources. With these challenges in mind, we propose a novel security assessment methodology for analysing the security of critical services that are deployed in cloud environments. Our methodology offers flexibility, in that tailored policy-driven security assessments can be defined based on a user's requirements, relevant standards, policies, and guidelines. We have implemented and evaluated a system that supports online assessments using our methodology, which acquires and processes large volumes of security-related data without affecting the performance of the services in a cloud environment.

U2 - 10.1016/J.COSE.2017.03.009

DO - 10.1016/J.COSE.2017.03.009

M3 - Journal article

VL - 70

SP - 723

EP - 743

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

ER -