Skip to main content

Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA)

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Intelligent Computing and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 458))

  • 963 Accesses

Abstract

Gathering personal information of individuals’, in return to provide different personalized services, continues to grow. The adaptability and flexibility of cloud that allows mobility of data access and multiple ownerships provide a favorable platform for users and service providers to adapt Cloud services for storing and accessing personal data. However data flow from one level to another service level of cloud may cause data loss or leakage and put the privacy of individuals at risk without them being aware of it. Ensuring privacy of information on Cloud, presents a major challenge to be tackled by future researchers. This paper aims at providing an overall picture of cloud privacy and security at its different level of architecture and discusses the proposed solutions. It will further provide detailed analyses of the various adopted techniques. We will also discuss Security-SLA as a security protection mechanism for cloud users. Further we will try to highlight the areas which can be further researched and make cloud a more secure place to store data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Y. Jadeja and K. Modi, “Cloud computing - concepts, architecture and challenges,” in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 877–880.

    Google Scholar 

  2. G. Zhang, Y. Yang, X. Zhang, C. Liu, and J. Chen, “Key Research Issues for Privacy Protection and Preservation in Cloud Computing,” in 2012 Second International Conference on Cloud and Green Computing, 2012, pp. 47–54.

    Google Scholar 

  3. S. Hamouda, “Security and privacy in cloud computing,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 241–245, Dec. 2012.

    Google Scholar 

  4. S. Surianarayanan and T. Santhanam, “Security issues and control mechanisms in Cloud,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 74–76, Dec. 2012.

    Google Scholar 

  5. H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Secur. Priv. Mag., vol. 8, no. 6, pp. 24–31, Nov. 2010.

    Google Scholar 

  6. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” J. Internet Serv. Appl., vol. 1, no. 1, pp. 7–18, Apr. 2010.

    Google Scholar 

  7. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, Oct. 2012.

    Google Scholar 

  8. S. M. Rahaman and M. Farhatullah, “PccP: A model for Preserving cloud computing Privacy,” 2012 Int. Conf. Data Sci. Eng., pp. 166–170, Jul. 2012.

    Google Scholar 

  9. S. De Capitani Di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,” 7th Int. Conf. Risks Secur. Internet Syst. Cris. 2012, 2012.

    Google Scholar 

  10. K. Surya, M. Nivedithaa, S. Uma, and C. Valliyammai, “Security issues and challenges in cloud,” 2013 Int. Conf. Green Comput. Commun. Conserv. Energy, pp. 889–893, 2013.

    Google Scholar 

  11. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012.

    Google Scholar 

  12. P. Yadav and S. Sujata, “Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA,” Int. J. Cloud Comput. Serv. Archit., vol. 3, no. 3, pp. 25–40, 2013.

    Google Scholar 

  13. I. Roy, S. T. V. S. T. V Setty, A. Kilzer, V. Shmatikov, and E. Witchel, “Airavat: Security and privacy for MapReduce,” Proc. 7th USENIX Conf. Networked Syst. Des. Implement., pp. 20–20, 2010.

    Google Scholar 

  14. D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 973, pp. 647–651, 2012.

    Google Scholar 

  15. M. P. K. Shelke, M. S. Sontakke, and a D. Gawande, “Intrusion Detection System for Cloud Computing,” Int. J. Sci. Technol. Res., vol. 1, no. 4, pp. 67–71, 2012.

    Google Scholar 

  16. H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and Prevention System in Cloud Computing,” in 2013 Africon, 2013, pp. 1–5.

    Google Scholar 

  17. C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing,” Procedia Technol., vol. 6, pp. 905–912, 2012.

    Google Scholar 

  18. L. Chen and D. B. Hoang, “Novel Data Protection Model in Healthcare Cloud,” in 2011 IEEE International Conference on High Performance Computing and Communications, 2011, pp. 550–555.

    Google Scholar 

  19. H. Tianfield, “Security issues in cloud computing,” 2012 IEEE Int. Conf. Syst. Man, Cybern., pp. 1082–1089, Oct. 2012.

    Google Scholar 

  20. M. Hoehl, “Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud.”.

    Google Scholar 

  21. R. Schmidt, “Conceptualisation and Lifecycle of Cloud Based Information Systems,” 2012 IEEE 16th Int. Enterp. Distrib. Object Comput. Conf. Work., pp. 104–113, 2012.

    Google Scholar 

  22. K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, “Security SLAs for Federated Cloud Services,” in 2011 Sixth International Conference on Availability, Reliability and Security, 2011, pp. 202–209.

    Google Scholar 

  23. M. Jaatun, K. Bernsmed, and A. Undheim, “Security SLAs–An Idea Whose Time Has Come?,” Multidiscip. Res. Pract. Inf. Syst., pp. 123–130, 2012.

    Google Scholar 

  24. S. A. de Chaves, C. B. Westphall, and F. R. Lamin, “SLA Perspective in Security Management for Cloud Computing,” in 2010 Sixth International Conference on Networking and Services, 2010, pp. 212–217.

    Google Scholar 

  25. M. Rak, N. Suri, J. Luna, D. Petcu, V. Casola, and U. Villano, “Security as a Service Using an SLA-Based Approach via SPECS,” Requir. Eng. Cloud Comput. (RECC - CloudCom), vol. 2, pp. 1–6, 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amitava Nag .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Joydeep Choudhury, Indushree Banerjee, Amitava Nag, Indika Parera (2017). Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA). In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds) Proceedings of the First International Conference on Intelligent Computing and Communication. Advances in Intelligent Systems and Computing, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-10-2035-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2035-3_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2034-6

  • Online ISBN: 978-981-10-2035-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics