Cloud computing adoption framework: A security framework for business clouds

V Chang, YH Kuo, M Ramachandran - Future Generation Computer …, 2016 - Elsevier
Future Generation Computer Systems, 2016Elsevier
This article presents a cloud computing adoption framework (CCAF) security suitable for
business clouds. CCAF multilayered security is based on the development and integration of
three major security technologies: firewall, identity management, and encryption based on
the development of enterprise file sync and share technologies. This article presents the
vision, related works, and views on security framework. Core technologies have been
explained in detail, and experiments were designed to demonstrate the robustness of the …
This article presents a cloud computing adoption framework (CCAF) security suitable for business clouds. CCAF multilayered security is based on the development and integration of three major security technologies: firewall, identity management, and encryption based on the development of enterprise file sync and share technologies. This article presents the vision, related works, and views on security framework. Core technologies have been explained in detail, and experiments were designed to demonstrate the robustness of the CCAF multilayered security. In penetration testing, CCAF multilayered security could detect and block 99.95% viruses and trojans, and could achieve≥ 85% of blocking for 100 h of continuous attack. Detection and blocking took< 0.012 s/trojan or virus. A full CCAF multilayered security protection could block all SQL (structured query language) injection, providing real protection to data. CCAF multilayered security did not report any false alarm. All F-measures for CCAF test results were≥ 99.75%. The mechanism of blending of CCAF multilayered security with policy, real services, and business activities has been illustrated. Research contributions have been justified and CCAF multilayered security can be beneficial for volume, velocity, and veracity of big data services operated in the cloud.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果

安装“学术搜索”按钮,即可在浏览网页的同时查找论文。

Google学术搜索按钮
https://www.example.edu/paper.pdf
[PDF]引用

Bibliography

  1. Einstein, A., B. Podolsky, and N. Rosen, 1935, “Can quantum-mechanical description of physical reality be considered complete?”, Phys. Rev. 47, 777-780.