Introducing the Information Security Management System in Cloud Computing Environment

被引:8
作者
Tot, Laslo [1 ]
Grubor, Gojko [2 ]
Marta, Takacs [3 ]
机构
[1] Singidunum Univ, Belgrade 11000, Serbia
[2] Sinergija Univ, Bijeljina 76300, Bosnia & Herceg
[3] Obuda Univ, Inst Appl Math, John Neumann Fac Informat, H-1034 Budapest, Hungary
关键词
CC ISMS; CC SMF; Proactive Digital Forensic; Digital forensics; CCS QMS;
D O I
10.12700/APH.12.3.2015.3.9
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Numerous organizations coordinate and certify their information security systems according to the Information Security Management System (ISMS) standard. Available Cloud Computing Services (CCSs) include new types of vulnerability (management, virtualization, sprawl, etc.) and differ in management requirements from other computational systems. Establishing a consistent security management framework (SMF) and information security management system (ISMS) in CC environment is a complicated, demanding and time-consuming process. Every experience from applying ISMS standard solutions is certainly useful, but not enough to entirely cover all security requirements of the customers and Cloud Service Provider (CSP). Attempts of establishing an integrated and consistent SMF and ISMS in CC environment have not been researched in-depth in recent available literature. In this paper, authors suggested a framework for an establishing quality management system (QMS) of CCSs, including CC SMF and CC ISMS, proactive digital forensic (DF), proactive and predictive security controls and corporate DF investigation process up to the level specified in Service Level Agreement (SLA).
引用
收藏
页码:147 / 166
页数:20
相关论文
共 21 条
[1]  
[Anonymous], 2011, PROACTIVE DETECTION
[2]  
Bradford P.G., 2005, LAYERED APPROACH INS
[3]  
Buyya R., 2011, Cloud computing: principles and paradigms. s.l
[4]  
Cichonski P., 2012, NIST Special Publication, V800
[5]  
ENISA, 2009, CLOUD COMP INF ASS F
[6]  
ENISA (European Network and Information Security Agency), 2012, INSECURE MAGAZINE, P14
[7]  
ENISA (European Network and Information Security Agency), 2012, PROACT DET NETW SEC
[8]  
Gara O, 2010, VIRTUALIZATION MAGAZ
[9]  
Gottlieb J., 2012, KEY CHALLENGES PROAC
[10]  
Grance T., 2005, NIST SPECIAL PUBLICA, V800-86