[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Dynamic Certification of Cloud Services: Trust, but Verify!

Published: 01 March 2016 Publication History

Abstract

Although intended to ensure cloud service providers' security, reliability, and legal compliance, current cloud service certifications are quickly outdated. Dynamic certification, on the other hand, provides automated monitoring and auditing to verify cloud service providers' ongoing adherence to certification requirements.

References

[1]
Apple Media Advisory: Update to Celebrity Photo Investigation,” Apple Inc., Sept. 2014; www.apple.com/pr/Iibrary/2014/09/02Apple-Media-Advisory.html.
[2]
A. Sunyaev and S. Schneider, “Cloud Services Certification,” Comm. ACM, vol. 56, no. 2, 2013, pp. 33–36.
[3]
S. Lins et al., “What Is Really Going on at Your Cloud Service Provider? Creating Trustworthy Certifications by Continuous Auditing,” in Proc. 48th Hawaii Int'l Conf. System Science (HICSS 15), 2015, pp. 5352–5361.
[4]
P. Stephanow and N. Fallenbeck, “Towards Continuous Certification of Infrastructure-as-a-Service Using Low-Level Metrics,” in Proc. 12th IEEE Int'l Conf. Advanced and Trusted Computing (ATC 15), 2015; www.ngcert.de/wp-content/uploads/2015/07/Towards-continuous-certification-of-Infrastructure-as-a-Service-using-low-level-metrics.pdf
[5]
I. Windhorst and A. Sunyaev, “Dynamic Certification of Cloud Services,” in Proc. 8th Int'l Conf. Availability, Reliability and Security (ARES 13), 2013, pp. 412–417.
[6]
F. Doelitzscher et al., “Validating Cloud Infrastructure Changes by Cloud Audits,” in Proc. IEEE World Congress on Services (SERVICES 12), 2012, pp. 377–384.
[7]
B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” IEEE Trans. Cloud Computing, vol. 2, no. 1, 2014, pp. 43–56.
[8]
C.E. Brown, J.A. Wong, and A.A. Baldwin, “A Review and Analysis of the Existing Research Streams in Continuous Auditing,” J. Emerging Technologies in Accounting, vol. 4, no. 1, 2007, pp. 1–28.
[9]
R.K.L. Ko et al., “TrustCloud: A Framework for Accountability and Trust in Cloud Computing,” in Proc. IEEE World Congress on Services (SERVICES 11), 2011, pp. 584–588.
[10]
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations,” Nat'l Inst. Standards and Technology, Sept. 2011; http://csrc.nist.gov/publications/nistpubs/800-137/SP800-137-Final.pdf.
[11]
S. Zawoad, A.K. Dutta, and R. Hasan, “SecLaaS: Secure Logging-as-a-Service for Cloud Forensics,” in Proc. 8th ACM SIGSAC Symp. Information, Computer and Communications Security (ASIA CCS 13), 2013, pp. 219–230.
[12]
S. Lins et al., “Trust Is Good, Control is Better: Creating Secure Clouds by Continuous Auditing,” to be published in IEEE Trans. Cloud Computing, 2016.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 14, Issue 2
Mar.-Apr. 2016
86 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 March 2016

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Design Theory for Certification PresentationsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3614178.361418354:3(75-118)Online publication date: 4-Aug-2023
  • (2020)Towards Inclusive Privacy Protections in the CloudApplied Cryptography and Network Security Workshops10.1007/978-3-030-61638-0_19(337-359)Online publication date: 19-Oct-2020
  • (2019)Trust Establishment and Estimation in Cloud ServicesJournal of Network and Systems Management10.1007/s10922-018-9475-y27:2(489-540)Online publication date: 1-Apr-2019
  • (2019)An Insight into Decisive Factors in Cloud Provider Selection with a Focus on SecurityComputer Security10.1007/978-3-030-42048-2_19(287-306)Online publication date: 26-Sep-2019
  • (2018)Test-Based Security Certification of Composite ServicesACM Transactions on the Web10.1145/326746813:1(1-43)Online publication date: 4-Dec-2018
  • (2018)Modeling time, probability, and configuration constraints for continuous cloud service certificationComputers and Security10.1016/j.cose.2017.09.01272:C(234-254)Online publication date: 1-Jan-2018
  • (2018)Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing Information Security and Cryptology10.1007/978-3-030-14234-6_12(223-239)Online publication date: 14-Dec-2018

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media