An Applied Methodology for Information Security and Assurance: A Study Case for Cloud Computing

被引:0
作者
Villalon-Fonseca, Ricardo [1 ]
Solano-Rojas, Braulio J. [1 ]
Marin-Raventos, Gabriela [1 ]
机构
[1] Univ Costa Rica, CITIC ECCI, San Jose, Costa Rica
来源
2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST) | 2014年
关键词
Security; Information Assurance; Methodology; Requirement Analysis; Cloud Computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information security is one of the main concerns in many fields of computer and information technologies, and even more on new emerging technologies such as cloud computing. Current security standards and models usually focus on "what" has to be done about security, but they do not propose "how" to deal with the inherent complexity of assuring modern infrastructures. Security standards usually produce large check lists describing security countermeasures, but they lack a comprehensive and complete process to define the security requirements of information being managed. As a consequence, security implementations may miss important security controls, and they cannot guarantee a consistent and in-depth security implementation at the different layers of the system. We propose a methodology with a novel hierarchical approach to guide a comprehensive and complete assurance process. Real use cases are shown, by applying our methodology to assure a private cloud being developed at the Universidad de Costa Rica (UCR).
引用
收藏
页码:432 / 439
页数:8
相关论文
共 23 条
[1]  
[Anonymous], INT J COMPUTER SCI
[2]  
[Anonymous], 2009, NATL I STAND TECHNOL, DOI DOI 10.6028/NIST.SP.800-145
[3]  
Awodele O, 2011, INT J COMPUTER
[4]  
Bejtlich R., 2004, The Tao of Network Security Monitoring
[5]  
Bhamidipati K, 2012, 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), P69, DOI 10.1109/ICCCTAM.2012.6488074
[6]  
Bishop M., 2002, Computer Security: Art and Science
[7]  
Cherdantseva Yulia, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P546, DOI 10.1109/ARES.2013.72
[8]  
Chunye Gong, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P275, DOI 10.1109/ICPPW.2010.45
[9]   Cloud Computing: Issues and Challenges [J].
Dillon, Tharam ;
Wu, Chen ;
Chang, Elizabeth .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :27-33
[10]  
Erl T., 2013, Cloud computing: concepts, technology architecture