IT security and governance compliant service oriented computing in cloud computing environments

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)

Abstract

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud's control.

LanguageEnglish
Title of host publicationPrinciples, Methodologies, and Service-Oriented Approaches for Cloud Computing
PublisherIGI Global
Chapter6
Pages143-163
Number of pages21
ISBN (Print)9781466628540
DOIs
Publication statusPublished - 1 Dec 2013
Externally publishedYes

Fingerprint

Cloud computing
Elasticity
Statistics
Degradation
Compliance

Cite this

Al-Aqrabi, H., & Liu, L. (2013). IT security and governance compliant service oriented computing in cloud computing environments. In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing (pp. 143-163). IGI Global. https://doi.org/10.4018/978-1-4666-2854-0.ch006
Al-Aqrabi, Hussain ; Liu, Lu. / IT security and governance compliant service oriented computing in cloud computing environments. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, 2013. pp. 143-163
@inbook{2270efddd1544818ab7bdd3b62e76fcc,
title = "IT security and governance compliant service oriented computing in cloud computing environments",
abstract = "The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud's control.",
author = "Hussain Al-Aqrabi and Lu Liu",
year = "2013",
month = "12",
day = "1",
doi = "10.4018/978-1-4666-2854-0.ch006",
language = "English",
isbn = "9781466628540",
pages = "143--163",
booktitle = "Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing",
publisher = "IGI Global",

}

Al-Aqrabi, H & Liu, L 2013, IT security and governance compliant service oriented computing in cloud computing environments. in Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, pp. 143-163. https://doi.org/10.4018/978-1-4666-2854-0.ch006

IT security and governance compliant service oriented computing in cloud computing environments. / Al-Aqrabi, Hussain; Liu, Lu.

Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, 2013. p. 143-163.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - IT security and governance compliant service oriented computing in cloud computing environments

AU - Al-Aqrabi, Hussain

AU - Liu, Lu

PY - 2013/12/1

Y1 - 2013/12/1

N2 - The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud's control.

AB - The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud's control.

UR - http://www.scopus.com/inward/record.url?scp=84898552597&partnerID=8YFLogxK

U2 - 10.4018/978-1-4666-2854-0.ch006

DO - 10.4018/978-1-4666-2854-0.ch006

M3 - Chapter

SN - 9781466628540

SP - 143

EP - 163

BT - Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing

PB - IGI Global

ER -

Al-Aqrabi H, Liu L. IT security and governance compliant service oriented computing in cloud computing environments. In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global. 2013. p. 143-163 https://doi.org/10.4018/978-1-4666-2854-0.ch006