Abstract

Cloud computing is the most accurate paradigm of next generation internet-based distributed computing systems providing an innovative business model for organisations. It offers potential benefits including cost savings, flexibility and improved business outcomes for organisations. Despite the potential advantages of cloud computing, security is one of the major issues remaining questionable. In this paper, two crucial security threats of cloud computing systems are presented and are assigned to one of four categories of our security policy. We facilitate both users and providers to know about these security threats and we propose security metrics that providers could use to evaluate the security of their services. Finally, the necessary policy rules and required procedures are described. Our approach tackles the cloud security issues providing guidance in the form of a set of rules which can be utilised for monitoring the implementation and effectiveness of security controls in cloud environments.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.