EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System

Abstract

In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their information technology (IT) systems to the cloud due to the technological and economic opportunities it provides. However, security and compliance concerns exist that can undermine confidence and trust in cloud service providers. To address these concerns, an eligibility and verification system (EVS) is proposed to improve confidence and trust in cloud service providers, and the cloud community as a whole. The EVS architecture is designed to verify the existence of information security, privacy, and compliance (ISPC) controls in cloud services. This is achieved viaseveral measures, i.e. real-time monitoring, physical verification, and an in-depth five domain ISPC control matrix. This system establishes a foundation for promoting transparent, trusted, and compliant cloud services.

Authors and Affiliations

Fahad F Alruwaili, T. Aaron Gulliver

Keywords

Related Articles

Analysis and Applications of IOT using Raspberry Pi

As the next frontier of the Internet, the IoT represents a persuasive opportunity across an astounding array of applications. When taken as a whole, the IoT can potentially transform nearly every aspect of how we live...

Vertical And Horizontal Partition Of Microdata For Publishing Through Privacy

Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving micro data publishing. Recent work has shown that generalization loses considerable amount of info...

Performance Optimization in Wireless Channel Using Adaptive Fractional Space CMA

In many high-data-rate band limited digital communication systems, the transmission of a training sequence is either impractical or very costly in terms of data throughput. Conventional LMS adaptive filters dependin...

Performance Evaluation of different Routing Algorithm in Wireless Ad hoc Networks

A mobile ad hoc network consists of wireless hosts and the movement of hosts results in a change in routes. There are many routing protocols proposed by different researchers but to determine which one work efficient...

Digital Video Disambiguation Technique Using 3-Level DWT

Digital video watermarking technique was introduced in 1954 by Hembrooke. The watermark encodes or represents information that can defend the video, typically identifying the proprietor (source) or the deliberate rec...

Download PDF file
  • EP ID EP28371
  • DOI -
  • Views 341
  • Downloads 5

How To Cite

Fahad F Alruwaili, T. Aaron Gulliver (2015). EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System. International Journal of Research in Computer and Communication Technology, 4(12), -. https://www.europub.co.uk/articles/-A-28371