Towards Achieving Data Security With The Cloud Computing Adoption Framework
Towards Achieving Data Security With The Cloud Computing Adoption Framework
Towards Achieving Data Security With The Cloud Computing Adoption Framework
1 Introduction
that all the d ata they u se and share are w ell protected .
Som e researchers assert that secu rity shou ld be im plem ented before the u se of any Clou d services in place [68]. This m akes a challenging ad option scenario for organizations since secu rity shou ld be enforced and im plem ented in parallel w ith any services. Althou gh organiz ations that ad opt Clou d Com pu ting acknow led ge benefits
offered by Clou d services, challenges su ch as secu rity and
privacy rem ain a scru tiny for organizational ad option.
While overseeing the im portance of secu rity, the softw are
engineering and d evelopm ent process shou ld alw ays d esign, im plem ent and test secu rity featu res.
The d ata centers have encou ntered challenges of rapid
increase in the d ata [9-11]. For exam ple, in a d ata center
that the lead au thor u sed to w ork w ith, d aily increase of
100 terabytes of d ata w as com m on. If the organization has
encou ntered a rapid rise of d ata grow th and is u nable to
resp ond qu ickly and efficiently, problem s su ch as d ata
traffic, d ata secu rity and service level agreem ent issu es
V ictor Chang works for School of Computing, Creative Technologies and
Engineering, Leeds Beckett University, Headinely campus, Leeds LS6 3QR, can happen [6, 11]. In this paper, w e focu s on the d ata
UK. He is affiliated with Electronics and Computer Science, University of secu rity w hile experiencing a large increase of d ata,
Southampton, Southampton SO17 1BJ, UK. E-mail:
w eather they are from the external sou rces su ch as attack
V .I.Chang@leedsbeckett.ac.uk (corresponding author).
M uthu Ramachandran is with School of Computing, Creative Technologies of viru ses or trojans; or they from the internal sou rces if
and Engineering, Leeds Beckett University, Headinely campus, Leeds LS6 u sers or clients accu m u late hu nd red s of terabytes of d ata
3QR, UK. E-mail: M .Ramachandran @leedsbeckett.ac.uk
per d ay. This is a research challenge for d ata secu rity
w hich is essential for the better m anagem ent of the d ata
Please note that all acknowledgments should be placed at the center to hand le a rap id increase in the d ata.
end of the paper, before the bibliography (not e t hat correAp art from the d ata center secu rity m anagem ent for
sponding aut horship is not not ed in affiliat ion box, but
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
lenges associated w ith secu rity. H ow ever, they only pr ovid e an overview of im portant secu rity challenges bu t d o
not provid e a fu ll d etailed solu tion on Clou d secu rity. Liu
et al [7] explain their softw are secu rity analysis w ith their
rationale and an exam p le. H ow ever, there is a lack of d etails abou t the softw are d esign and im plem entation pr ocess involved , and em pirical resu lts to evalu ate its perform ance and effectiveness of their proposed solu tion,
w hich looks like the com bination of UML and w orkflow s.
Yu et al [13] and Wang et al [14] propose their finegrained secu rity m od el for Clou d storage. Both are sim ilar, except that p rop osal from Yu et al [14] are m ore in
d etails and they explain theories and u sers associated
w ith their proof-of-concept. H ow ever, both proposals [13,
14] d o not have any experim ents, sim u lation and em pir ical d ata to prove the effectiveness and robu stness of their
fine-grained secu rity m od el. Thu s, both proposals d o not
ad d ress in-d epth d ata secu rity issu es, w hen the rapid
grow th of d ata is a challenge for the Data Center.
There are com m on observations in the secu rity pr oposed m ethod s: Each p aper [7-8, 10, 12, 14] only proposes
a single solu tion. In the event of frau d , cyber crim inal
activities and u nau thorized hack, the secu rity solu tion is
insu fficient to protect the d ata secu rity and the d ata center if only a single solu tion is ad opted . H ence, a better
alternative is requ ired . We proposed the m u lti-layered
secu rity to integrate secu rity techniqu es to illu strate the
essence and effectiveness of the fram ew ork w ith a d vantages of d oing so. First, the strength of each techniqu e
is enhanced . Second , since each techniqu e can not alw ays
fu lly prevent hacking or provid e a fu ll solu tion w ithou t
fallacy, the m u lti-layered secu rity can im prove the extent
of secu rity since it is m ore d ifficu lt for viru ses and trojans
to break d ifferent types of secu rity in one go. The aim is
to m axim ize secu rity p rotection and red u ce the threats.
To d em onstrate the d ata secu rity of the private clou d s
hosted in the d ata center, w e prop ose the u se of ethical
hacking to d em onstrate w hether ou r CCAF m u lti-layered
secu rity can w ithstand a large am ou nt of viru ses and trojans attacks, if the rapid d ata increase is from the external
m aliciou s hacking. We w ill provid e d etailed process and
resu lts in Section 5.
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
Chang and Ram achand ran: Tow ard s achieving Clou d Data Secu rity w ith the Clou d Com p u t ing Ad op tion
Fram ew ork
3
u se of XML to transfer and interpret d ata throu gh their
secu rity m echanism . The u se of the fram ew ork is an su itable app roach provid ed w ith carefu l and clear explan ations. We have proposed ou r ow n fram ew ork, Clou d
Com pu ting Ad option Fram ew ork (CCAF), to ad d ress the
secu rity challenge.
The CCAF is a com prehensive m od el for ad opting and
ap plying clou d secu rity principles system atically. The
ou tcom e of each activity is show n insid e the p arenthesis.
These best practice techniqu es w ill keep grow as the
fram ew ork has been in variou s ap plications. It is a co nceptu al fram ew ork like ITIL version 3 to gu id e organizations for the best practices. Ad d itionally, su ch a fram ew ork can integrate w ith Clou d Com pu ting services to
provid e ad d ed valu es for ad opting organizations [16]. It
is also an architectu re fram ew ork focu sed on the d elivery
of a secu rity service, in the form of d eveloping a m u ltilayered secu rity for d ata centers. Zhang et al. (2008) explain their rationale, backgrou nd , core technologies, u sage scenarios, experim ents, resu lts and their interpret ations. Their app roach is heavily focu sed on the u se of
XML to transfer and interpret d ata throu gh their secu rity
m echanism . Fram ew ork is an ap propriate m ethod provid ed w ith carefu l and clear explanations. This section
presents the backgrou nd w ork and overview for ou r pr oposed Clou d Com pu ting Ad option Fram ew ork (CCAF).
2.1 Overview
We generalize the areas for secu rity overview . The follow ing are categories of CCAF secu rity aim s to cover:
Ap plication softw are secu rity w hich d eals w ith
how w e can bu ild system s that can au tom atically
protect them selves.
N etw ork (LAN , MAN , GAN ), w ireless netw ork secu rity and platform secu rity inclu d e Operating
System s, Virtu alization and system s softw are.
Convergence netw ork secu rity w here converging,
m u lti-netw ork m ed ia infrastru ctu res, social netw orks and technologies, w hich is one of the em erging areas of research.
Service-oriented secu rity w here issu es related to
system services su ch as d enial of service attacks,
d istribu ted d enial of services, and w eb services.
Clou d secu rity d eals w ith services secu rity, d at a
secu rity and privacy so that services d elivered and
assets are protected .
Open-sou rce softw are secu rity inclu d es issu es su ch
as tru st, certification and qu alification m od els.
Softw are com p onents and architectu re, secu rity
w hich d eals w ith bu ild ing com pon ents and architectu res w ith secu rity can be u sed as plu g-ins.
Web services secu rity is essential to ensu re secu re
services are d elivered w ith integrity.
System s & Softw are secu rity engineering d eals
w ith bu ild ing secu rity in CCAF right from r equ irem ents. This is also consid ered d eveloping
softw are applications w ith CCAF.
Recom m end ations from McGraw [17] provid e a com prehensive fram ew ork for system s engineering m ethod s
and concepts. H ow ever, it d oes not offer a com plete solu -
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
know n as SQUARE (Secu re Qu ality Requ irem ents Eng ineering) w hich has been extend ed SysSQUARE (System s
Engineering SQUARE) tow ard s system s secu rity eng ineering m ethod . Ou r extend ed m ethod consists of ten
steps as follow :
Agree on definition to d efine a set of acronym s,
d efinitions, and d om ain -specific know led ge need s
to be agreed by stakehold ers. This w ill help id ent ify and valid ate secu rity-specific requ irem ents
clearly by stakehold ers.
Identify security goals to clearly d efine w hat is
expected of the system w ith respect to secu rity of
bu siness d rivers, p olicies and proced u res.
D evelop artefacts to d evelop scenarios, for exam ples, m isu se cases and tem p lates for specifications
and form s.
Perform risk assessments to cond u ct risk analysis
for all secu rity goals id entified , cond u ct threat
analysis.
Select an elicitation technique to inclu d e system atic id entification and analysis of secu rity requ ir em ents from stakehold ers in the form s of interviews,
business process modeling and simulations, prototypes,
discussion and focus groups. As p art of this phase,
one shou ld id entify level of secu rity, cost-benefits
analysis, organizational cu ltu re, stru ctu re and
style.
Elicit security requirements to inclu d e activities
su ch as prod u cing secu rity requ irem ents d ocu m ent based secu rity specific principle stru ctu re as
part of ou r goal of d eveloping CCAF earlier, risk
assessm ent resu lts, and techniqu es id entifies for
analysis su ch as business process modeling and simulations, threat modeling, and misuse cases, etc.
Categorize security requirements to inclu d e activities that (1) classify and categorize secu rity requ irem ents based on com pany-specific requ irem ents specification tem plates and (2) u se ou r recom m end ed secu rity principles as this w ill help
System s Engineers to ap ply CCAF and (3) track secu rity-specific requ irem ents to valid ate & verify at
all stages of the system s engineering life-cycle.
Identify systems data security requirements to
inclu d e activities on extracting and carefu lly id entifying d ata secu rity and relevant su b-system s
su ch as d ata centers, servers, clou d VMs, and
softw are secu rity, SQL secu rity, and other types of
secu rity that are relevant to the d ata. This separ ation of concerns allow s system s engineers to integrate, track, d esign, and d evelop d ata secu rity as
part of enterprise w id e system s d evelopm ent.
Prioritize security requirements to inclu d e activities of selecting and p rioritizing secu rity requ ir em ents based on bu siness goals as w ell as costbenefit analysis.
Inspect security requirements to cond u ct requ irem ents valid ation process u sing requ irem ents
inspection and review m eetings.
To achieve an integrated secu rity for the iterated requ irem ents, one can select keyw ord s as objects a nd com ponents. System and softw are com ponents shou ld contain a CCAF m u lti-layered secu rity and each layer has its
ow n secu rity focu s. Details w ill be presented in Section 3
and 5.
Most of the secu rity attribu tes and principles id entified
earlier are clearly applicable to d eveloping clou d services
rity challenges either you consid er architectu ral and technological concerns nor process and regu latory secu rity
challenges; all of them com es d ow n to d ata in m any
form s su ch as inform ation (d eals w ith id entity m ana gem ent), d ata in transition and transaction, d ata in m od ification, privacy of u ser d ata, and d ata at rest on servers
and storages. H ow ever, the selections of a nu m ber of recom m end ations [7-9; 20-24] have id entified abou t eight
key d ata secu rity issu es that are:
Data tam pering d eals w ith issu es of u nau thorized
m od ification to a transaction. For exam ple, if you
ad d 100 tim es to a sim ple transaction of / $1000.00
this equ als to / $100K. Oracle [22] presents that
80% of secu rity breaches are cau sed by insid er attacks than any other form s of secu rity attacks.
Eavesd ropping and Data Theft d eal w ith stealing
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
Chang and Ram achand ran: Tow ard s achieving Clou d Data Secu rity w ith the Clou d Com p u t ing Ad op tion
Fram ew ork
5
critical personal d ata (personal and financial inform ation su ch as cred it card ) d u ring d ata tran sm ission. N etw ork and p acket sniffers can be u sed
to steal su ch inform ation.
Falsifying User Id entities d eals w ith id entity theft
by gaining access to d ata and can also threaten d igital signatu res w ith non -repu d iation attacks
Passw ord -related threats d eals w ith stealing and
cracking passw ord s.
Au thorized access to tables, colu m ns, and row s
d eals w ith secu rity at the d atabase level.
Lack of accou ntability d eals w ith system ad m inistrators for m onitoring and protecting d ata access
and u ser accou nt m anagem ent.
Com plex User Managem ent Requ irem ents d eal
w ith u ser accou nt m an agem ent strategies.
Mu lti-tier System s d eal w ith provid ing access to
other services and ap plication layers.
Scaling the secu rity ad m inistration of m u ltiple Sy stem s poses extra com plexity of m anaging clou d secu rity as it d eals w ith provid ing m u ltiple accesses
to m u ltiple applications.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
param eter tam pering, cross site scripting, SQL injection and cookie poisoning. The id entity m anagem ent is enforced to ensu re that right level of a ccess is only granted to the right person.
The third layer, being an innovative ap proach, Encryption, enforces top d ow n policy based secu rity
m anagem ent; integrity m anagem ent. This featu re
m onitors and provid es early w arning as soon as
the behavior of the m u lti-layered entity starts to
behave abnorm ally; and end -to-end continu ou s assu rance w hich inclu d es the investigation and r em ed iation after an abnorm ality is d etected .
Althou gh Yu et al. [13] have illu strated a sim ilar exam ple, their prop osal is focu sed on theoretical concepts
rather than services on offer and im plem entation. They
focu s on access control and d o not have a com prehensive
ap proach in p rovid ing m u lti-layered secu rity. The d etails
in each layer of secu rity are presented as follow s.
CCAF Server
Three roles are offered by the server. First, it can au thenticate u sers d u ring the storage/ retrieval phase. Second , it
can access control. Third , it can encrypt/ d ecrypt d ata
betw een u sers and their clou d . The d ata can be fu rther
encrypted to prevent d ictionary attacks before being fo rw ard ed to the m etad ata m anager (MM). Blocks are d ecrypted and the server verifies the signatu re of each block
w ith the u sers pu blic key d u ring the retrieval phase.
7E0764BF 3E53053E
After the id entity m anagem ent phase, all d ata has to u nd ergo the secu rity test offered by Convergent encryption
(CoE), w hich u ses the hash of plaintext to w ork ou t the
encryption key (K). H ere is a sam ple exam ple to illu strate
how it w orks. Ad am obtains the encryption key from his
m essage M su ch that K = H (M), w here H is a crypt ograp hic hash fu nction; he u ses this key to encrypt his
m essage, hence: CoE = E(K, M)= E(H (M);M), w here E is a
block cipher. By applying this techniqu e, tw o d ifferent
u sers w ith tw o id entical plaintexts w ill obtain tw o id ent ical ciphertexts since the encryption key is the sam e. This
allow s the clou d storage p rovid er to perform efficient
storage (su ch as d ed u plication, w hich m eans the sam e file
is only stored and archived at one place w ithou t d u p lication) on su ch ciphertexts w ithou t having any know led ge
on the original plain -texts. We then illu strate to encryp t
the ciphertexts w ith other encryption algorithm u sing the
sam e keying m aterial for all inpu t to prevent attacks
against. The benefit is that the d ed u plication requ irem ent
can be com p atible w ith CoE.
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
Chang and Ram achand ran: Tow ard s achieving Clou d Data Secu rity w ith the Clou d Com p u t ing Ad op tion
Fram ew ork
7
they are controlled . Bu t u ntil to a certain statu s trigger the
bod y im m u nity, bad / cancerou s cells cannot be controlled . To offset his, ou r hu m an bod y triggers the alarm
for bod y d efense. Sim ilar to ou r secu rity d esign , statu s=1
m eans that an alarm is triggered and the rem ed y action
begins. The system m anager can also m anu ally trigger it
if the d ata center is u nd er the threat before the system
d etection tu rns positive.
Table 2: The cod e syntax for CCAF secu rity
While trigger(status(job)) d o
check(status(job)); / / to check the status is 0 or 1
if (security == 1)
firew all(status(job));
id entity(status(job));
encryption(status(job));
else
action((status(job));
quarantine(status(job));
report(status(job)); / / report the system ; d o not stop CCAF
end ;
end ;
If secu rity is equ al to 1, w hich m eans the CCAF secu rity process is kicked off as show n in Table 2. If secu rity
is equ al 0, it m eans the CCAF recognizes there is a low
risk and threat. The term statu s(job) m eans that the
CCAF secu rity is offering real-tim e protection and actions
for qu arantine. All these CCAF com m and s enable the
fu nctioning of m u lti-layered secu rity. Explanations of
other parts of the secu rity process are as follow s.
trigger(statu s(job)) is to enable the triggering of
the contingency action . It is the first step to trigger a list of actions for m aintaining system and
d ata secu rity.
check(statu s(job) is to check the statu s of secu rity is 0 or 1. The statu s 0 is the controlled statu s
and statu s of 1 is the triggered statu s d u e to secu rity breach or threats.
firew all(statu s(job)) is to enable firew all on.
id entity(statu s(job)) is to enable id entity m anagem ent to be active.
encryption(statu s(job)) is to enable encryption
on. By d efau lt, the first three are on.
qu arantine((statu s(job)) is w hen the CCAF sy stem find s the Trojans or viru ses, it begins the isolate trojans and viru ses and attem pt to kill them
or retain them to be com pletely isolated .
action((statu s(job)) is to m anu ally m ake the
above com m and s.
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
ing bu siness im p rovem ent for su stainability and perform ance evalu ation. Most of the existing w ork in this area
[27-29] has largely focu sed on perform ance evalu ation of
core bu siness p rocess only. This w ork has ap plied to
stu d y the perform ance of clou d d ata secu rity p rocess.
H ence, w e have d eveloped a nu m ber of key clou d secu r ity process that is critical for clou d d ata. Figu re 2 proposes
a good principle for the clou d architectu ral d esign pr ocess w hich is also based on som e of the key stakeho ld ers/ concepts to consid er d u ring architectu ral d esign:
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
Chang and Ram achand ran: Tow ard s achieving Clou d Data Secu rity w ith the Clou d Com p u t ing Ad op tion
Fram ew ork
9
Figu re 6: Data secu rity Area Peak Access- H igh execu tion tim e w hen d ata in u se
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
10
Data in Change inclu d es all types of d ata creation and m od ification processes, from file creation/ d eletion of fold ers.
1.98
1.96
1.94
1.92
1.9
1.88
1.86
BPMN
execution
time to
compute
Figure 10,
11 and 12
5 The experiments of
penetration testing for
ethical hacking
To d em onstrate w hether the ULCC can w ithstand the
rapid d ata grow th d u e to the viru ses and trojans, ethical
hacking is an appropriate w ay to test the system perform ance [30-31]. Ethical hacking inclu d es w ays to penetrate
into the secu rity system in the aw areness of the host. The
environm ent for the ethical hacking w as as follow s. One
hu nd red of virtu al m achines (VMs) w ere set u p and each
one had the CCAF m u lti-layered secu rity tu rning on. An
ethical hacking firm (w hich d id not w ant its nam e r evealed ) took p art in this test and provid ed 10,000 know n
viru ses and trojans d etected betw een 2010 and 2012 in the
internet secu rity breach and each of these viru ses/ trojans
had their fix patches or repairs by the m ost-u p-to-d ate
secu rity com pany. The objective is to test how m any v iru ses and trojans that CCAF m u lti-layered secu rity can
block and qu arantine. Another one hu nd red VMs have
the Mcafee antiviru s (a w ork partner) tu rning on to test
the perform ance. This section presents the penetration
testing and ou tcom es of the test to su pp ort that the m u ltilayered secu rity can perform better for, filter ou t m aliciou s attacks. To d o this test, 10,000 know n trojans and
viru ses are injected into the CCAF m u lti-layered secu rity
w ith the follow ing nu m bers record ed :
The nu m ber of viru ses and trojans d etected and
blocked by each layer.
The total nu m bers of viru ses and trojans d etected
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
Chang and Ram achand ran: Tow ard s Clou d Data Secu rity p rop osed and d em onstrated by Clou d Com p u ting
Ad op tion Fram ew ork
11
and blocked the system .
The nu m ber of viru ses and trojans d etected bu t
u nable to be blocked and sent to qu arantine.
In the qu arantine, the nu m ber of viru ses and tr ojans that can be d estroyed .
In the qu arantine, the nu m ber of viru ses and tr ojans that cannot be d estroyed .
Tw o types of experim ents w ere u nd ertaken. The first
one w as focu sed on penetration tests involved w ith injecting 10,000 viru ses and trojans in one go. The second one
w as focu sed on continu ou s penetration test, su ch as injecting 10,000 sam e viru ses and trojans every five hou rs to
test that the entire d ata center is u nd er the secu rity threat
as presented by BPMN sim u lations in Section 4.
Layer of FGSM
Firewall
No. of
viruses &
trojans
detected and
trapped by
each layer
Indentity
= ( /) x 100%
(3)
Encryption
1000
2000
3000
4000
5000
6000
(
1
1 /
N ) x 100%
(1)
= (
0 / 0 ) x 100%
(2)
Percentage of blocking
100
0
80
percentage
of blocking
viruses and
trojans
60
40
20
0
1
9
11 13 15 17 19
Hours (1 unit = 5 hours)
21
23
25
Figu re 11: The percentage that viru ses and trojans that
have been blocked
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
12
com pare perform ance w ith ou r CCAF m u lti-layered secu rity. Mcafee service w as sim ilar to the intru sion d etection
system (IDS) and intru sion p revention system (IPS).
Multi-layered FGSM vs single-layered securtiy
Security approach
Single layered
Mcaf ee
(4)
No of
viruses and
trojans killed
or blocked
Multi-layered FGSM
2000
4000
6000
8000
10000
12000
Figu re 12: CCAF m u lti-layered secu rity versu s singlelayered secu rity (eg one Mcafee prod u ct)
10,000 viru ses and trojans provid ed by the ethical
hacking com pany w as u sed and resu lts su ch as the nu m ber of viru ses and trojans killed or isolated w ere recor d ed . Figu re 12 show s the num ber of viru ses and trojans
killed or blocked , w here the CCAF m u lti-layered cou ld
kill/ block 9,917 and the single-layered Mcafee cou ld
kill/ block 7,438. We then reprod u ced the sam e exper im ent show n in Figu re 12 to com pare tw o ap proaches.
The resu lts in Figu re 13 show ed that the CCAF m u ltilayered secu rity has an average of 20% perform ance better than the ad option of a single-layered secu rity (su ch as
Mcafee) throu ghou t the 125 hou rs of experim ents. Resu lts
in ou r em pirical stu d ies confirm that the m u lti-layered
ap proach can provid e a better secu rity service for the d ata
center, particu larly w hen the d ata secu rity is a prim ary
concern for the Clou d ad opters and u sers. H ow ever, only
one Mcafee prod u ct w as u sed for com p arison d u e to the
licensing issu e althou gh m u ltiple Mcafee p rod u cts cou ld
serve like w hat CCAF m u lti-layered secu rity cou ld offer.
Percentage of blocking viruses and trojans (multi-layered versus single-layered)
120
Percentage of blocking
100
80
CCAF
60
Macafee
40
20
0
1
(5)
w here:
Tru e positive (tp) refer to the nu m ber of true
vu lnerabilities d etected ;
False positives (fp) refer to the nu m ber of vu lnerabilities d etected bu t d o not exist.
Tru e vu lnerabilities (tv) refer to the total nu m ber
of vu lnerabilities d etected in penetration tests.
F-m easu re can be presented in term s of precision and
recall as follow s.
F-m easu re
(6)
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
Chang and Ram achand ran: Tow ard s Clou d Data Secu rity p rop osed and d em onstrated by Clou d Com p u ting
Ad op tion Fram ew ork
13
tion read y for fu rther checks. Since experim ents have
been cond u cted over 125 hou rs w ith 99.19% PTe, 99.98%
STe, 100% precision, 99.19% recall and 99.5% F-m easu re,
there is a good reliability. The u se of CCAF m u tli-layered
secu rity can ensu re the high level of protection and safegu ard of d ata secu rity for the organizations.
References
[1]
S., Marston, Z., Li, S., Band yopadhyay, J., Zhang, A., Ghalsasi,
"Cloud com puting The business perspective". Decision Su pport System s, Elsevier, 51(1): pp 176-189, 2011.
[2] M. A., Vouk, "Cloud Com puting Issues, Research and Im plem entations". Journal of Com -puting and Inform ation Technology - CIT 16, page 235246, Volum e 4, 2008.
[3] A. K., Jha, C. M., DesRoches, E. G., Cam pbell, K., Donelan, S. R.,
Rao, T. G., Ferris, & D., Blum enthal. Use of electronic health
record s in US hospitals. N ew England Journal of Med icine,
360(16), 1628-1638, 2009.
[4] H . T., Peng, W. W., H su, C. H ., Chen, F., Lai, J. M. Ho, "Fina ncialCloud: Open Cloud Fram ework of Derivative Pricing. In Social Com puting (SocialCom ), 2013 International Conference on
(pp. 782-789). IEEE, 2013, Septem ber.
[5] M., Mircea, A. I., And reescu, "Using cloud com puting in higher
ed ucation: A strategy to im prove agility in the current financial
crisis". Com m unications of the IBIMA, 2011, 1-15.
[6] M., Arm brust, A., Fox, R., Griffith, A. D., Joseph, R. H ., Katz, A.,
Konw inski, G., Lee, D., Patterson, A., Rabkin, I., Stoica, M.,
Zaharia, "Above the Cloud s: A Berkeley View of Cloud com p uting". Comm unications of the ACM, 53(4), 50-58, 2010.
[7] L., Liu, E., Yu, & J., Mylopoulos, Security and privacy requirem ents analysis w ithin a social setting. In Requirem ents
Engineering Conference, 2003. Proceed ings, 11th IEEE International (pp. 151-161), IEEE, 2003, Septem ber.
[8] T., Mather, S., Kumaraswam y, S. Latif, (2009), Cloud security
and privacy: an enterprise perspective on risks and com pli1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2491281, IEEE Transactions on Services Computing
14
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]