EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their information technology (IT) systems to the cloud due to the technological and economic opportunities it provides. However, security and compliance concerns exist that can undermine confidence and trust in cloud service providers. To address these concerns, an eligibility and verification system (EVS) is proposed to improve confidence and trust in cloud service providers, and the cloud community as a whole. The EVS architecture is designed to verify the existence of information security, privacy, and compliance (ISPC) controls in cloud services. This is achieved viaseveral measures, i.e. real-time monitoring, physical verification, and an in-depth five domain ISPC control matrix. This system establishes a foundation for promoting transparent, trusted, and compliant cloud services.
Authors and Affiliations
Fahad F Alruwaili, T. Aaron Gulliver
http://www.ijrcct.org/index.php/ojs/article/download/1385/pdf
A performance efficient asynchronous parallel Self Timed Adder(PASTA) is presented in this paper. This adder achieves better performance even without any speedup circuitry/lookahed schem/carry skip unit. Skew problem...
Performance Analysis of AODV and DSR Routing Protocols in MANET’S
Mobile ad-hoc networks (MANETS) are formed by a collection of mobile nodes that have the ability to form a communication network without the help of any fixed infrastructure. Because of the nature of these networks,...
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as...
Protective Speculation Clouds With Valuable Cost
In this paper, we propose Protective Speculation Clouds With Valuable Cost constraint based approach to identify which datasets need to be encrypted and which do not, so that privacy preserving cost can be saved whil...
Providing Security and Minimizing Data Management Cost in the Cloud
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome...