scholarly journals Method for Evaluating Security of Cloud IT-Components based on Estandards Criteria

2020 ◽  
Vol 19 (2) ◽  
pp. 383-411
Author(s):  
Ilya Livshitz

The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered. An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services. A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.

Author(s):  
Alpana M. Desai ◽  
Kenrick Mock

Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of cloud computing. Enterprises that plan to utilize cloud services for their infrastructure, platform, and/or software needs must understand the security risks and privacy issues related to cloud computing. This chapter discusses the technical, legal, and policy/organizational security risks of cloud computing, and reviews recommendations/strategies for managing and mitigating security threats in cloud computing. It also presents vendor-specific solutions and strategies that cloud service providers are implementing for mitigating security risks in cloud computing.


2021 ◽  
Vol 74 (3) ◽  
pp. 589-595
Author(s):  
Natalia V. Stuchynska ◽  
Igor V. Belous ◽  
Pavlo V. Mykytenko

The aim: Is to present and substantiate approaches to the organization of radiation diagnostics training using cloud services. Materials and methods: The experimental research was carried out at on 306 students of the Bogomolets National Medical University. To perform the set tasks, some theoretical and empirical methods of scientific research were used, namely: system analysis method, bibliosemantic method, statistical method, modeling method. Results: The expediency of building a hybrid digital environment, which combines the capabilities of the corporate and public cloud service and allows one to create an information system of personalized access to electronic educational resources was justified. This environment is implemented within the cloud service Nextcloud. The basic components of radiological diagnostics training by means of network technologies are considered and characterized. An experimental test of the effectiveness of the cloud services use is conducted in the process of training radiological diagnostics. Conclusions: The expediency of creating a modern digital educational environment based on the Nextcloud service for training radiological diagnostics has been justified. Moreover, it is demonstrated that pedagogically balanced and reasoned introduction of cloud services in the educational process promotes increased efficiency of educational process of radiological diagnostics.


2015 ◽  
pp. 1450-1463
Author(s):  
Alpana M. Desai ◽  
Kenrick Mock

Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of cloud computing. Enterprises that plan to utilize cloud services for their infrastructure, platform, and/or software needs must understand the security risks and privacy issues related to cloud computing. This chapter discusses the technical, legal, and policy/organizational security risks of cloud computing, and reviews recommendations/strategies for managing and mitigating security threats in cloud computing. It also presents vendor-specific solutions and strategies that cloud service providers are implementing for mitigating security risks in cloud computing.


2020 ◽  
Vol 44 (5) ◽  
pp. 953-975
Author(s):  
Emna Ben-Abdallah ◽  
Khouloud Boukadi ◽  
Mohamed Hammami ◽  
Mohamed Hedi Karray

PurposeThe purpose of this paper is to analyze cloud reviews according to the end-user context and requirements.Design/methodology/approachpropose a comprehensive knowledge base composed of interconnected Web Ontology Language, namely, modular ontology for cloud service opinion analysis (SOPA). The SOPA knowledge base will be the basis of context-aware cloud service analysis using consumers' reviews. Moreover, the authors provide a framework to evaluate cloud services based on consumers' reviews opinions.FindingsThe findings show that there is a positive impact of personalizing the cloud service analysis by considering the reviewers' contexts in the performance of the framework. The authors also proved that the SOPA-based framework outperforms the available cloud review sites in term of precision, recall and F-measure.Research limitations/implicationsLimited information has been provided in the semantic web literature about the relationships between the different domains and the details on how that can be used to evaluate cloud service through consumer reviews and latent opinions. Furthermore, existing approaches are lacking lightweight and modular mechanisms which can be utilized to effectively exploit information existing in social media.Practical implicationsThe SOPA-based framework facilitates the opinion based service evaluation through a large number of consumer's reviews and assists the end-users in analyzing services as per their requirements and their own context.Originality/valueThe SOPA ontology is capable of representing the content of a product/service as well as its related opinions, which are extracted from the customer's reviews written in a specific context. Furthermore, the SOPA-based framework facilitates the opinion based service evaluation through a large number of consumer's reviews and assists the end-users in analyzing services as per their requirements and their own context.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


Symmetry ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 467
Author(s):  
Shih-Chih Chen ◽  
Shing-Han Li ◽  
Shih-Chi Liu ◽  
David C. Yen ◽  
Athapol Ruangkanjanases

In addition to the rapid development of global information and communications technology (ICT) and the Internet, recent rapid growth in cloud computing technology represents another important trend. Individual continuance intention towards information technology is a critical area in which information systems research can be performed. This study aims to develop an integrated model designed to explain and predict an individual’s continuance intention towards personal cloud services based on the concepts of technology readiness (TR) and the unified theory of acceptance and use of technology 2 (UTAUT2), moderated by gender, age, and experience of personal cloud services. The key results of the partial least square test largely support the proposed model’s validity and the significant impact of effort expectancy, social influence, hedonic motivation, price value, habit, and technology readiness on continuance intention towards personal cloud services. In addition to providing symmetric theoretical support with the proposed model and transforming the individual characteristics of TR into UTAUT2, this study could be used to enhance and analyze users’ adoption of personal cloud services and also increase the symmetry of the model’s explanation and prediction. The findings from this research contribute to providing practical implications and academic resources as well as improving our understanding of personal cloud service applications.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


Aviation ◽  
2012 ◽  
Vol 16 (4) ◽  
pp. 130-135
Author(s):  
Vaidotas Kondroška ◽  
Jonas Stankūnas

This work reviews the innovative and progressive methods of determination and analysis of safety objectives using Vilnius A-SMGCS example. The aim of the analysis is to determine how failures in this system could affect flight safety in Vilnius aerodrome. Identified safety objectives will limit the frequency of occurrence of hazards enough for the associated risk to be acceptable, and will ensure that appropriate mitigation means are reflected subsequently as Safety Requirements for the system. Analysis reflects aspects of A-SMGCS Safety objectives, which should be taken into consideration. Santrauka Darbe apžvelgiami progresyvūs saugos tikslų analizės metodai pagal Vilniaus aerodromo automatizuotos antžeminio eismo stebėjimo ir kontrolės sistemos veiklos pavyzdį. Analizuojama, kaip šios sistemos sutrikimai gali paveikti skrydžių saugą Vilniaus aerodrome. Remiantis galimų pavojų skrydžių saugai analize, tyrime nustatyti saugos tikslai, pagal kuriuos vėliau bus numatomos riziką mažinančios priemonės (galimų pavojų neutralizavimui ar kylančios rizikos sumažinimui iki priimtino lygio). Straipsnyje pateikiami veiksniai, kuriuos reikėtų įvertinti nustatant aerodromo automatizuotos antžeminio eismo stebėjimo ir kontrolės sistemos saugos tikslus.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Sign in / Sign up

Export Citation Format

Share Document