skip to main content
10.1109/CLOUD.2015.157guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Semantic Approach to Cloud Security and Compliance

Published: 27 June 2015 Publication History

Abstract

Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these measures would comply with their security and compliance requirements. We have conducted a comprehensive study to review the potential threats faced by cloud consumers and have determined the compliance models and security controls that should be in place to manage the risk. Based on this study, we have developed an ontology describing the cloud security controls, threats and compliances. We have also developed an application that classifies the security threats faced by cloud users and automatically determines the high level security and compliance policy controls that have to be activated for each threat. The application also displays existing cloud providers that support these security policies. Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.

Cited By

View all
  1. A Semantic Approach to Cloud Security and Compliance

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CLOUD '15: Proceedings of the 2015 IEEE 8th International Conference on Cloud Computing
    June 2015
    1166 pages
    ISBN:9781467372879

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 27 June 2015

    Author Tags

    1. Cloud computing
    2. Cloud security models
    3. Security compliance models
    4. cloud security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 29 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)CertGraph: Towards a Comprehensive Knowledge Graph for Cloud Security CertificationsProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3652620.3687795(76-77)Online publication date: 22-Sep-2024
    • (2021)Minimizing privilege for building HPC containersProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis10.1145/3458817.3476187(1-14)Online publication date: 14-Nov-2021
    • (2019)Comparative Analysis of Cloud Security Classifications, Taxonomies, and OntologiesProceedings of the 2019 International Conference on Artificial Intelligence and Computer Science10.1145/3349341.3349487(666-672)Online publication date: 12-Jul-2019
    • (2017)Cloud security certificationsProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3025169(1-12)Online publication date: 22-Mar-2017
    • (2017)IT Security and Privacy Standards in ComparisonProceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing10.1109/CCGRID.2017.137(1090-1099)Online publication date: 14-May-2017
    • (2016)Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption FrameworkInternational Journal of Information Technology and Web Engineering10.4018/IJITWE.201607010411:3(50-64)Online publication date: 1-Jul-2016

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media