The University of Southampton
University of Southampton Institutional Repository

Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework

Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework
Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework
This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and feature for CCAF. The CCAF implementations have been illustrated to show how to enforce security and ensure all users are protected. It provides three layers of security in Access control and firewalls; Intrusion Detection Systems (IDS) and Prevention System; and Isolation Management to maintain a high level of Cloud security. CCAF security offers a framework to serve the Cloud community. The key characteristics have been explained. We will develop more service updates and demonstrations for our forthcoming projects to ensure that CCAF security can provide more use cases and added value to the Cloud community.
Cloud Computing Adoption Framework (CCAF), Cloud security
Ramachandran, Muthu
2130f62e-6f28-40ea-8c81-cb0beba747c8
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
Ramachandran, Muthu
2130f62e-6f28-40ea-8c81-cb0beba747c8
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4

Ramachandran, Muthu and Chang, Victor (2014) Cloud Security proposed and demonstrated by Cloud Computing Adoption Framework. The first international workshop on Emerging Software as a Service and Analytics, Barcelona, Spain. 03 - 05 Apr 2014.

Record type: Conference or Workshop Item (Paper)

Abstract

This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and feature for CCAF. The CCAF implementations have been illustrated to show how to enforce security and ensure all users are protected. It provides three layers of security in Access control and firewalls; Intrusion Detection Systems (IDS) and Prevention System; and Isolation Management to maintain a high level of Cloud security. CCAF security offers a framework to serve the Cloud community. The key characteristics have been explained. We will develop more service updates and demonstrations for our forthcoming projects to ensure that CCAF security can provide more use cases and added value to the Cloud community.

Text
security_framework_submission.pdf - Other
Restricted to Registered users only
Download (148kB)

More information

Published date: 4 April 2014
Venue - Dates: The first international workshop on Emerging Software as a Service and Analytics, Barcelona, Spain, 2014-04-03 - 2014-04-05
Keywords: Cloud Computing Adoption Framework (CCAF), Cloud security
Organisations: Electronics & Computer Science, Electronic & Software Systems

Identifiers

Local EPrints ID: 362556
URI: http://eprints.soton.ac.uk/id/eprint/362556
PURE UUID: ebe2cb83-de4c-4c44-8d6a-9759941f02fa

Catalogue record

Date deposited: 25 Feb 2014 18:45
Last modified: 14 Mar 2024 16:09

Export record

Contributors

Author: Muthu Ramachandran
Author: Victor Chang

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×