Cloud computing security auditing

Irfan Gul*, Atiq Ur Rehman, M. Hasan Islam

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

36 Citations (Scopus)

Abstract

In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing resources as on-demand basis and get worry free with the underlying technologies used. Cloud computing model is composed of three service models Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) and four deployment models Public, Private, Community and Hybrid. A third party service provider, stores & maintains data, application or infrastructure of Cloud user. Relinquishing the control over data and application poses challenges of security, performance, availability and privacy. Security issues in Cloud computing are most significant among all others. Information Technology (IT) auditing mechanisms and framework in cloud can play an important role in compliance of Cloud IT security policies. In this paper, we focus on cloud security audit mechanisms and models.

Original languageEnglish
Title of host publicationProceedings - 2nd International Conference on Next Generation Information Technology, ICNIT 2011
Pages143-148
Number of pages6
Publication statusPublished - 2011
Externally publishedYes
Event2nd International Conference on Next Generation Information Technology, ICNIT 2011 - Gyeongju, Korea, Republic of
Duration: 21 Jun 201123 Jun 2011

Publication series

NameProceedings - 2nd International Conference on Next Generation Information Technology, ICNIT 2011

Conference

Conference2nd International Conference on Next Generation Information Technology, ICNIT 2011
Country/TerritoryKorea, Republic of
CityGyeongju
Period21/06/1123/06/11

Keywords

  • Cloud security
  • IaaS
  • PaaS
  • SaaS
  • SOA
  • TPA

Fingerprint

Dive into the research topics of 'Cloud computing security auditing'. Together they form a unique fingerprint.

Cite this