Security assurance assessment methodology for hybrid clouds

Computers & Security - Tập 70 - Trang 723-743 - 2017
Aleksandar Hudic1, Paul Smith1, Edgar R. Weippl2
1AIT Austrian Institute of Technology, Donau-City-Straße 1, 1220 Vienna, Austria
2SBA Research, Favoritenstraße 16, 1040 Vienna, Austria

Tài liệu tham khảo

Aceto, 2013, Cloud monitoring: a survey, Comput Netw, 57, 2093, 10.1016/j.comnet.2013.04.001 Anisetti Anisetti, 2014 Anisetti Anisetti Auradkar Aversa Bleikertz Brinkmann Caron Casola Cimato da Cunha Drago Esposito, 2016, Encryption-based solution for data sovereignty in federated clouds, IEEE Cloud Comput, 3, 12, 10.1109/MCC.2016.18 Fatema, 2014, A survey of cloud monitoring tools: taxonomy, capabilities and objectives, J Parallel Distrib Comput, 74, 2918, 10.1016/j.jpdc.2014.06.007 Garcia, 2011 González Groß Guttman, 1995 Herrmann, 2002 Heyman Hudic I. O. for Standardization, I. E. Commission I. O. for Standardization, I. E. Commission, 2008 I. O. for Standardization, I. E. Commission, 2008 I. O. for Standardization, I. E. Commission, 2010 Jensen Juliadotter, 2015, Cloud attack and risk assessment taxonomy, IEEE Cloud Comput, 2, 14, 10.1109/MCC.2015.2 Katopodis Khajeh-Hosseini Khan Kotenko, 2013 Krotsiani, 2014 Krotsiani, 2013 Lins Maeder, 2000 Martini, 2012, An integrated conceptual digital forensic framework for cloud computing, Digital Investig, 9, 71, 10.1016/j.diin.2012.07.001 Martini, 2013, Cloud storage forensics: ownCloud as a case study, Digital Investig, 10, 287, 10.1016/j.diin.2013.08.005 Martini, 2014, Distributed filesystem forensics: XtreemFS as a case study, Digital Investig, 11, 295, 10.1016/j.diin.2014.08.002 Massonet Naik, 2013 Nguyen Nist, E. Aroms, 2012 OWASP P. S. S. Council Quick, 2014, Google drive: forensic analysis of data remnants, J Netw Comput Appl, 40, 179, 10.1016/j.jnca.2013.09.016 Quick, 2013, Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?, Digital Investig, 10, 266, 10.1016/j.diin.2013.07.001 Quick, 2013, Digital droplets: Microsoft SkyDrive forensic data remnants, Future Gener Comput Syst, 29, 1378, 10.1016/j.future.2013.02.001 Rahman, 2015, A survey of information security incident handling in the cloud, Comput Secur, 49, 45, 10.1016/j.cose.2014.11.006 Rahman, 2016, Forensic-by-design framework for cyber-physical cloud systems, IEEE Cloud Comput, 3, 50, 10.1109/MCC.2016.5 Rak Ranjan, 2014, Streaming big data processing in datacenter clouds, IEEE Cloud Comput, 1, 78, 10.1109/MCC.2014.22 Rannenberg, 1993 Rinaldi, 2001, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Contr Syst, 21, 11, 10.1109/37.969131 Santos Savola, 2007 Savola, 2009 Savola Scarfone, 2007 Scarfone, 2010 Schneider Schöller Shao Spanoudakis Such, 2016, Information assurance techniques: perceived cost effectiveness, Comput Secur, 60, 117, 10.1016/j.cose.2016.03.009 Sun, 2011 Sunyaev, 2013, Cloud services certification, Commun ACM, 56, 33, 10.1145/2408776.2408789 Takabi, 2010, Security and privacy challenges in cloud computing environments, IEEE Secur Priv, 8, 24, 10.1109/MSP.2010.186 Toshniwal van Renesse, 2003, Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining, ACM Trans Comput Syst, 21, 164, 10.1145/762483.762485 Vaarandi, 2014 Wang, 2015, Building a replicated logging system with Apache Kafka, Proceedings VLDB Endowment, 8, 1654, 10.14778/2824032.2824063 Windhorst