Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4630
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDogra, Himanshuen_US
dc.contributor.authorVerma, Sudhakaren_US
dc.contributor.authorHubballi, Neminathen_US
dc.contributor.authorSwarnkar, Mayanken_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:00Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:00Z-
dc.date.issued2018-
dc.identifier.citationDogra, H., Verma, S., Hubballi, N., & Swarnkar, M. (2018). Security service level agreement measurement in cloud: A proof of concept implementation. Paper presented at the 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, 1-6. doi:10.1109/ANTS.2017.8384139en_US
dc.identifier.isbn9781538623473-
dc.identifier.otherEID(2-s2.0-85049954001)-
dc.identifier.urihttps://doi.org/10.1109/ANTS.2017.8384139-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4630-
dc.description.abstractSecurity concerns of cloud computing mainly originate from outsourced data and computation on which data owners do not have full control. Recent works in both industry and academia documented these concerns well and described both technical and non-technical measures to address these concerns. Many of the suggestions to address security concerns are in the form of physical audits by experts and certifications from standard groups for compliance. Unlike the performance measurement in cloud, security measurement is not matured and except solutions which address these concerns in part, there is no comprehensive mechanism which looks everything user wants to know about cloud. This paper introduces a notion of service level agreement from security perspective and proposes to monitor the cloud environment for run time compliance. Monitoring is done by a third party on end user's behalf by collecting credible evidence in the form of events, logs and measurement snapshots. Through this collected evidence the third party can answer to user security concerns stated in the form of SLA for compliance. We do a proof-of-concept implementation of security measurement with few sample service level agreements. © 2017 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.source11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017en_US
dc.subjectNetwork architectureen_US
dc.subjectRegulatory complianceen_US
dc.subjectCloud environmentsen_US
dc.subjectOutsourced datumen_US
dc.subjectPerformance measurementsen_US
dc.subjectProof of concepten_US
dc.subjectSecurity measurementen_US
dc.subjectSecurity servicesen_US
dc.subjectService Level Agreementsen_US
dc.subjectTechnical measuresen_US
dc.subjectQuality of serviceen_US
dc.titleSecurity service level agreement measurement in cloud: A proof of concept implementationen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: