scispace - formally typeset
Open AccessJournal ArticleDOI

A survey of compliance issues in cloud computing

Reads0
Chats0
TLDR
The lack of reference architectures and relevant patterns makes compliance harder than it should be, and some guidelines are given about what this architecture and its corresponding patterns should contain.
Abstract
Features such as elasticity, scalability, universal access, low entry cost, and flexible billing motivate consumers to migrate their core businesses to the cloud. However, in doing so there are challenges about security, privacy, and compliance. Businesses are pressured to comply with regulations depending on their service types; for example, in the US government agencies are required to comply with FISMA, healthcare organizations are required to comply with HIPAA; public retail companies must to comply with SOX and PCI. We survey work on compliance issues and we conclude that the lack of reference architectures and relevant patterns makes compliance harder than it should be. We also explore current industrial trends of compliance approaches. We end by summarizing compliance issues and give some guidelines about what this architecture and its corresponding patterns should contain.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI

Assessing information security risks in the cloud: A case study of Australian local government authorities

TL;DR: This study identifies and explores the critical factors associated with information security requirements of cloud services within the Australian regional local government context and proposes a conceptual cloud computing security requirements model with four components – data security; risk assessment; legal & compliance requirements; and business & technical requirements.
Journal ArticleDOI

The role of government regulations in the adoption of cloud computing: A case study of local government

TL;DR: It is concluded that government regulation is a significant aspect in decision making for the adoption of any new technology such as cloud computing.
Journal ArticleDOI

Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions

TL;DR: This paper covers the current trends and open challenges in IoHT device authentication mechanisms, such as the physically unclonable function (PUF) and blockchain-based techniques, and offers a comprehensive review of the IoHT or the Internet of Medical Things (IoMT).

Computers Privacy And Data Protection An Element Of Choice

Jana Reinhard
TL;DR: The latest book from a very famous author finally comes out as discussed by the authors, the book of computers privacy and data protection an element of choice, as an amazing reference becomes what you need to get.
References
More filters
Book

Design Patterns: Elements of Reusable Object-Oriented Software

TL;DR: The book is an introduction to the idea of design patterns in software engineering, and a catalog of twenty-three common patterns, which most experienced OOP designers will find out they've known about patterns all along.
Book

The Unified Modeling Language User Guide

TL;DR: In The Unified Modeling Language User Guide, the original developers of the UML provide a tutorial to the core aspects of the language in a two-color format designed to facilitate learning.
Journal ArticleDOI

Cloud computing

Brian Hayes
TL;DR: As software migrates from local PCs to distant Internet servers, users and developers alike go along for the ride.
Book

The Rational Unified Process: An Introduction

TL;DR: This chapter discusses the Rational Unified Process, a method for Modeling the Software Development Business using Software Engineering Techniques for Business Modeling, and its applications, from the Business Models to the Systems.
Book

Analysis patterns: reusable objects models

Martin Fowler
TL;DR: The World of Patterns, a Treatise on Conceptual Models and Business Process Reengineering, and Design Templates for Other Techniques is presented, with a focus on patterns for type model design Templates.
Related Papers (5)