Measuring security for cloud service provider: A Third Party approach

Md Whaiduzzaman, Abdullah Gani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Citations (Scopus)

Abstract

Cloud Computing (CC) is a new paradigm of utility computing and enormously growing phenomenon in the present IT industry hype. CC leverages low cost investment opportunity for the new business entrepreneur as well as business avenues for cloud service providers. As the number of the new Cloud Service Customer (CSC) increases, users require a secure, reliable and trustworthy Cloud Service Provider (CSP) from the market to store confidential data. However, a number of shortcomings in reliable monitoring and identifying security risks, threats are an immense concern in choosing the highly secure CSP for the wider cloud community. The secure CSP ranking system is currently a challenging aspect to gauge trust, privacy and security. In this paper, a Trusted Third Party (TTP) like credit rating agency is introduced for security ranking by identifying current assessable security risks. We propose an automated software scripting model by penetration testing for TTP to run on CSP side and identify the vulnerability and check security strength and fault tolerance capacity of the CSP. Using the results, several non-measurable metrics are added and provide the ranking system of secured trustworthy CSP ranking systems. Moreover, we propose a conceptual model for monitoring and maintaining such TTP cloud ranking providers worldwide called federated third party approach. Hence the model of federated third party cloud ranking and monitoring system assures and boosts up the confidence to make a feasible secure and trustworthy market of CSPs.

Original languageEnglish
Title of host publication2013 International Conference on Electrical Information and Communication Technology, EICT 2013
PublisherIEEE Computer Society
ISBN (Print)9781479922994
DOIs
Publication statusPublished - 2014
Event2013 International Conference on Electrical Information and Communication Technology, EICT 2013 - Khulna, Bangladesh
Duration: 13 Feb 201415 Feb 2014

Publication series

Name2013 International Conference on Electrical Information and Communication Technology, EICT 2013

Conference

Conference2013 International Conference on Electrical Information and Communication Technology, EICT 2013
Country/TerritoryBangladesh
CityKhulna
Period13/02/1415/02/14

Keywords

  • Cloud computing
  • cloud security ranking
  • cloud service provider
  • trusted third party

Fingerprint

Dive into the research topics of 'Measuring security for cloud service provider: A Third Party approach'. Together they form a unique fingerprint.

Cite this