A survey of compliance issues in cloud computing
Reads0
Chats0
TLDR
The lack of reference architectures and relevant patterns makes compliance harder than it should be, and some guidelines are given about what this architecture and its corresponding patterns should contain.Abstract:
Features such as elasticity, scalability, universal access, low entry cost, and flexible billing motivate consumers to migrate their core businesses to the cloud. However, in doing so there are challenges about security, privacy, and compliance. Businesses are pressured to comply with regulations depending on their service types; for example, in the US government agencies are required to comply with FISMA, healthcare organizations are required to comply with HIPAA; public retail companies must to comply with SOX and PCI. We survey work on compliance issues and we conclude that the lack of reference architectures and relevant patterns makes compliance harder than it should be. We also explore current industrial trends of compliance approaches. We end by summarizing compliance issues and give some guidelines about what this architecture and its corresponding patterns should contain.read more
Citations
More filters
Journal ArticleDOI
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI
Assessing information security risks in the cloud: A case study of Australian local government authorities
TL;DR: This study identifies and explores the critical factors associated with information security requirements of cloud services within the Australian regional local government context and proposes a conceptual cloud computing security requirements model with four components – data security; risk assessment; legal & compliance requirements; and business & technical requirements.
Journal ArticleDOI
The role of government regulations in the adoption of cloud computing: A case study of local government
Omar Ali,Valmira H. Osmanaj +1 more
TL;DR: It is concluded that government regulation is a significant aspect in decision making for the adoption of any new technology such as cloud computing.
Journal ArticleDOI
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions
TL;DR: This paper covers the current trends and open challenges in IoHT device authentication mechanisms, such as the physically unclonable function (PUF) and blockchain-based techniques, and offers a comprehensive review of the IoHT or the Internet of Medical Things (IoMT).
Computers Privacy And Data Protection An Element Of Choice
TL;DR: The latest book from a very famous author finally comes out as discussed by the authors, the book of computers privacy and data protection an element of choice, as an amazing reference becomes what you need to get.
References
More filters
Book
Design Patterns: Elements of Reusable Object-Oriented Software
TL;DR: The book is an introduction to the idea of design patterns in software engineering, and a catalog of twenty-three common patterns, which most experienced OOP designers will find out they've known about patterns all along.
Book
The Unified Modeling Language User Guide
TL;DR: In The Unified Modeling Language User Guide, the original developers of the UML provide a tutorial to the core aspects of the language in a two-color format designed to facilitate learning.
Journal ArticleDOI
Cloud computing
TL;DR: As software migrates from local PCs to distant Internet servers, users and developers alike go along for the ride.
Book
The Rational Unified Process: An Introduction
TL;DR: This chapter discusses the Rational Unified Process, a method for Modeling the Software Development Business using Software Engineering Techniques for Business Modeling, and its applications, from the Business Models to the Systems.
Book
Analysis patterns: reusable objects models
TL;DR: The World of Patterns, a Treatise on Conceptual Models and Business Process Reengineering, and Design Templates for Other Techniques is presented, with a focus on patterns for type model design Templates.
Related Papers (5)
An Integrated Knowledge Graph to Automate Cloud Data Compliance
Review: A survey on security issues in service delivery models of cloud computing
S. Subashini,V. Kavitha +1 more