Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework
Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework
This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and feature for CCAF. The CCAF implementations have been illustrated to show how to enforce security and ensure all users are protected. It provides three layers of security in Access control and firewalls; Intrusion Detection Systems (IDS) and Prevention System; and Isolation Management to maintain a high level of Cloud security. CCAF security offers a framework to serve the Cloud community. The key characteristics have been explained. We will develop more service updates and demonstrations for our forthcoming projects to ensure that CCAF security can provide more use cases and added value to the Cloud community.
Cloud Computing Adoption Framework (CCAF), Cloud security
Ramachandran, Muthu
2130f62e-6f28-40ea-8c81-cb0beba747c8
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
4 April 2014
Ramachandran, Muthu
2130f62e-6f28-40ea-8c81-cb0beba747c8
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
Ramachandran, Muthu and Chang, Victor
(2014)
Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework.
The first international workshop on Emerging Software as a Service and Analytics, Barcelona, Spain.
03 - 05 Apr 2014.
Record type:
Conference or Workshop Item
(Paper)
Abstract
This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and feature for CCAF. The CCAF implementations have been illustrated to show how to enforce security and ensure all users are protected. It provides three layers of security in Access control and firewalls; Intrusion Detection Systems (IDS) and Prevention System; and Isolation Management to maintain a high level of Cloud security. CCAF security offers a framework to serve the Cloud community. The key characteristics have been explained. We will develop more service updates and demonstrations for our forthcoming projects to ensure that CCAF security can provide more use cases and added value to the Cloud community.
Text
security_framework_submission.pdf
- Other
Restricted to Registered users only
More information
Published date: 4 April 2014
Venue - Dates:
The first international workshop on Emerging Software as a Service and Analytics, Barcelona, Spain, 2014-04-03 - 2014-04-05
Keywords:
Cloud Computing Adoption Framework (CCAF), Cloud security
Organisations:
Electronics & Computer Science, Electronic & Software Systems
Identifiers
Local EPrints ID: 362556
URI: http://eprints.soton.ac.uk/id/eprint/362556
PURE UUID: ebe2cb83-de4c-4c44-8d6a-9759941f02fa
Catalogue record
Date deposited: 25 Feb 2014 18:45
Last modified: 14 Mar 2024 16:09
Export record
Contributors
Author:
Muthu Ramachandran
Author:
Victor Chang
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics