A Reference Architecture for Validating Security Across Multi-Cloud Computing Systems

被引:0
作者
Edet, Henry [1 ]
机构
[1] Dr Colin Venters, Trondheim, Norway
来源
PROCEEDINGS OF EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING (EASE 2021) | 2021年
关键词
Cloud Computing; Cloud Security; Security Reference Architectures;
D O I
10.1145/3463274.3463345
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Correlative studies carried out by different experts have cited a number of impediments to the growth of cloud computing technology; at the top of the list is security and data privacy issues. More so, a systematic mapping study which was conducted at the start of this research, revealed that the most prevalent cloud security issues are a consequence of poor architecture. 73 percent of literature surveyed also revealed that frameworks and reference architectures are one of the most effective ways of preventing security and data privacy breaches within a cloud computing environment as these issues are addressed during the requirements phase, prior to deployment. [1], [14] This research seeks to explore a preventative approach to cloud security breaches through the use of reference architectures. Firstly, we investigate the main causes of cloud security breaches and then, we analyse existing reference architectures with the aim of designing a universal security framework usable across multi-cloud computing platforms.
引用
收藏
页码:288 / 293
页数:6
相关论文
共 21 条
[1]  
Addo Ivor D., 2014, 2014 International Conference on Trustworthy Systems and their Applications, P14, DOI 10.1109/TSA.2014.12
[2]  
Al-Azzani S., 2014, Ph.D. thesis
[3]   Practical Application and Empirical Evaluation of Reference Class Forecasting for Project Management [J].
Batselier, Jordy ;
Vanhoucke, Mario .
PROJECT MANAGEMENT JOURNAL, 2016, 47 (05) :36-51
[4]   Cloudrise: Exploring Cloud Computing Adoption and Governance With the TOE Framework [J].
Borgman, Hans P. ;
Bahli, Bouchaib ;
Heier, Hauke ;
Schewski, Fiona .
PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, :4425-4435
[5]   Architectural Approaches to Security: Four Case Studies [J].
Cervantes, Humberto ;
Kazman, Rick ;
Ryoo, Jungwoo ;
Choi, Duyoung ;
Jang, Duksung .
COMPUTER, 2016, 49 (11) :60-67
[6]  
Evans L., 2016, Information Management, V50, P28
[7]  
Jangral A, 2012, INT J COMPUTING BUSI, V3, P1
[8]  
Jansen W., 2011, DRAFT NIST SPECIAL P
[9]  
Kajiyama T., 2013, Cloud computing security: how risks and threats are affecting cloud adoption decisions
[10]  
Katzan H., 2009, SERV SCI, V1, P256, DOI [10.1287/serv.1.4.256, DOI 10.1287/SERV.1.4.256]