ISGcloud: a Security Governance Framework for Cloud Computing

被引:8
作者
Rebollo, Oscar [1 ]
Mellado, Daniel [2 ]
Fernandez-Medina, Eduardo [3 ]
机构
[1] Minist Labour & Immigrat, Social Secur IT Management, Madrid, Spain
[2] Spanish Tax Agcy, Large Taxpayers Dept, IT Auditing Unit, Madrid, Spain
[3] Univ Castilla La Mancha, Dept Informat Technol & Syst, GSyA Res Grp, E-13071 Ciudad Real, Spain
关键词
information security governance; secure cloud governance; cloud computing; security governance framework; cloud lifecycle; INTRUSION DETECTION; SYSTEM;
D O I
10.1093/comjnl/bxu141
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security risks to organizations' information assets are hindering the development of cloud computing services. A comprehensive security governance process is needed to foster the massive adoption of cloud services and to facilitate the deployment of a security culture within any company. In this paper, we present a framework focused on the security governance of the cloud computing environment (ISGcloud), which has been built upon standards. Its principal components are based on the ISO/IEC 38500 governance standard and on the ISO/IEC 27036 outsourcing security draft. We propose a systematic collection of activities and their related tasks which detail how security governance can be deployed during the entire cloud service lifecycle. Furthermore, the whole framework is formally modelled following the SPEM 2.0 specification that provides a standardized interface with which to automate and integrate our proposed process. The theoretical definition of our proposal is also accompanied by a practical example of its application, which provides specific details of ISGcloud framework's implementation.
引用
收藏
页码:2233 / 2254
页数:22
相关论文
共 38 条
[31]   Empirical evaluation of a cloud computing information security governance framework [J].
Rebollo, Oscar ;
Mellado, Daniel ;
Fernandez-Medina, Eduardo ;
Mouratidis, Haralambos .
INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 :44-57
[32]  
Rebollo O, 2012, J UNIVERS COMPUT SCI, V18, P798
[33]   Beyond lightning: A survey on security challenges in cloud computing [J].
Rong, Chunming ;
Nguyen, Son T. ;
Jaatun, Martin Gilje .
COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (01) :47-54
[34]  
Solms S. H., 2009, INFORM SECURITY GOVE
[35]   A combined approach to ensure data security in cloud computing [J].
Sood, Sandeep K. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) :1831-1838
[36]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11
[37]   Information Security Governance: A model based on the Direct-Control Cycle [J].
von Solms, Rossouw ;
Solms, S. H. Basie von .
COMPUTERS & SECURITY, 2006, 25 (06) :408-412
[38]   Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges [J].
Wood, Timothy ;
Ramakrishnan, K. K. ;
Shenoy, Prashant ;
Van der Merwe, Jacobus .
COMPUTER JOURNAL, 2012, 55 (08) :995-1004