EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their information technology (IT) systems to the cloud due to the technological and economic opportunities it provides. However, security and compliance concerns exist that can undermine confidence and trust in cloud service providers. To address these concerns, an eligibility and verification system (EVS) is proposed to improve confidence and trust in cloud service providers, and the cloud community as a whole. The EVS architecture is designed to verify the existence of information security, privacy, and compliance (ISPC) controls in cloud services. This is achieved viaseveral measures, i.e. real-time monitoring, physical verification, and an in-depth five domain ISPC control matrix. This system establishes a foundation for promoting transparent, trusted, and compliant cloud services.
Authors and Affiliations
Fahad F Alruwaili, T. Aaron Gulliver
Secret Sharing of Convergent Keys to Third Party Concept of Dekey
Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...
Analysis of Rabin and Rabin-P Cryptosystem for specifying correct plain text
This work, introduced a new, competent and useful scheme based on the Rabin cryptosystem without using the Jacobi symbol [1], message redundancy technique or the needs of extra bits in order to specify the correct pl...
Minimizing End-To-End Delay in Interactive Network Applications
Multiple users interaction in network applications such as teleconferencing, network gaming, and online trading are gaining popularity but these applications require that the delay difference in between multiple clie...
Self-motivated probe forms designed for database Uncertainties
Query form is a standout amongst the most broadly utilized client interfaces for questioning databases. Conventional inquiry structures are planned and precharacterized by engineers or DBA in different data administra...
Survey on DLMS Adaptive Filter With Low Delay
In practical applications of the LMS adaptive transversal filtering algorithm, a delay in the coefficient is updated. This paper discusses about the behavior of the delayed LMS algorithm. This paper present an effici...