A Comparative Review of Cloud Security Proposals with ISO/IEC 27002

被引:0
|
作者
Rebollo, Oscar [1 ]
Mellado, Daniel [2 ]
Fernandez-Medina, Eduardo [2 ]
机构
[1] Minist Labour & Immigrat, Social Secur IT Management, Madrid, Spain
[2] Univ Castilla La Mancha, GSyA Res Grp, Dept Informat Technol & Syst, Ciudad Real, Spain
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information Security is considered one of the main reasons why users are reluctant to adopt the new generation of services offered by cloud computing providers. In order to minimize risks, some security proposals have been developed, with the purpose of facing a wide range of security concerns. This paper reviews these existing approaches and defines a security comparative framework, based on ISO/IEC 27002, suitable for the cloud environment. The analysis process of these alternatives shows a partial compliance with the defined requirements as each one is focused on different issues. As a consequence, more investigation is needed to achieve a comprehensive cloud security framework. The results of this paper highlight the gaps and weaknesses of each proposal, so that directions are settled for future work.
引用
收藏
页码:3 / 12
页数:10
相关论文
共 50 条
  • [41] Security Threats in Cloud Computing Models: Domains and Proposals
    Revoredo da Silva, Carlo Marcelo
    Costa da Silva, Jose Lutiano
    Rodrigues, Ricardo Batista
    Medeiros Campos, Glaucia Melissa
    do Nascimento, Leandro Marques
    Garcia, Vinicius Cardoso
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 383 - 389
  • [42] Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
    Song, Boyeon
    Hwang, Jung Yeon
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (12) : 1375 - 1377
  • [43] Information security and value creation: The performance implications of ISO/IEC 27001
    Podrecca, Matteo
    Culot, Giovanna
    Nassimbeni, Guido
    Sartor, Marco
    [J]. Computers in Industry, 2022, 142
  • [44] Extension of ISO/IEC27001 to Mobile Devices Security Management
    Zhu, Xiaobo
    Zhu, Yunqian
    [J]. CYBER SECURITY, CNCERT 2018, 2019, 970 : 27 - 35
  • [45] ISO/IEC JTC1/SC27: Security
    Nakao, Koji
    [J]. Journal of the Institute of Image Electronics Engineers of Japan, 2015, 44 (02) : 254 - 258
  • [46] Supplement of security-related parts of ISO/IEC TR 15504
    Kim, S
    Leem, C
    Kim, T
    Kim, J
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 1084 - 1089
  • [47] A Security Evaluation and Certification Management Database Based on ISO/IEC Standards
    Chen, Huilin
    Bao, Da
    Gao, Hongbiao
    Cheng, Jingde
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 249 - 253
  • [48] ADOPTION OF STANDARD FOR INFORMATION SECURITY ISO/IEC 27001 IN BOSNIA AND HERZEGOVINA
    Skopak, Anis
    Sakanovic, Semir
    [J]. INTERNATIONAL CONFERENCE ON ECONOMIC AND SOCIAL STUDIES (ICESOS'16): REGIONAL ECONOMIC DEVELOPMENT: ENTREPNEURSHIP AND INNOVATION, 2016, : 35 - 42
  • [49] Information security fortification by ontological mapping of the ISO/IEC 27001 standard
    Fenz, Stefan
    Goluch, Gernot
    Ekelhart, Andreas
    Riedl, Bernhard
    Weippl, Edgar
    [J]. 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 381 - +
  • [50] Information security and value creation: The performance implications of ISO/IEC 27001
    Podrecca, Matteo
    Culot, Giovanna
    Nassimbeni, Guido
    Sartor, Marco
    [J]. COMPUTERS IN INDUSTRY, 2022, 142