IT security and governance compliant service oriented computing in cloud computing environments

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)

Abstract

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud's control.

Original languageEnglish
Title of host publicationPrinciples, Methodologies, and Service-Oriented Approaches for Cloud Computing
PublisherIGI Global
Chapter6
Pages143-163
Number of pages21
ISBN (Print)9781466628540
DOIs
Publication statusPublished - 1 Dec 2013
Externally publishedYes

    Fingerprint

Cite this

Al-Aqrabi, H., & Liu, L. (2013). IT security and governance compliant service oriented computing in cloud computing environments. In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing (pp. 143-163). IGI Global. https://doi.org/10.4018/978-1-4666-2854-0.ch006