Next Article in Journal
MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase
Next Article in Special Issue
Modeling and Security in Cloud Ecosystems
Previous Article in Journal
Context-Based Energy Disaggregation in Smart Homes
Article Menu

Export Article

Open AccessArticle
Future Internet 2016, 8(1), 5; doi:10.3390/fi8010005

A Framework for Security Transparency in Cloud Computing

1
School of Architecture, Computing and Engineering, University of East London, London E162RD, UK
2
Luxembourg Institute of Science and Technology, L-4362 Esch-sur-Alzette, Luxembourg
3
Secure Business Austria, Sommerpalais Harrach, Favoritenstrasse 16, 1040 Wien, Austria
*
Author to whom correspondence should be addressed.
Academic Editors: David G. Rosado and Stefanos Gritzalis
Received: 31 October 2015 / Revised: 12 December 2015 / Accepted: 22 January 2016 / Published: 17 February 2016
(This article belongs to the Special Issue Security in Cloud Computing and Big Data)
View Full-Text   |   Download PDF [1585 KB, uploaded 17 February 2016]   |  

Abstract

Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed and maintained externally to the organisation. Therefore, it is essential for cloud providers to demonstrate and implement adequate security practices to protect the data and processes put under their stewardship. Security transparency in the cloud is likely to become the core theme that underpins the systematic disclosure of security designs and practices that enhance customer confidence in using cloud service and deployment models. In this paper, we present a framework that enables a detailed analysis of security transparency for cloud based systems. In particular, we consider security transparency from three different levels of abstraction, i.e., conceptual, organisation and technical levels, and identify the relevant concepts within these levels. This allows us to provide an elaboration of the essential concepts at the core of transparency and analyse the means for implementing them from a technical perspective. Finally, an example from a real world migration context is given to provide a solid discussion on the applicability of the proposed framework. View Full-Text
Keywords: cloud computing; security transparency; cloud service provider; cloud service user cloud computing; security transparency; cloud service provider; cloud service user
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Ismail, U.M.; Islam, S.; Ouedraogo, M.; Weippl, E. A Framework for Security Transparency in Cloud Computing. Future Internet 2016, 8, 5.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top