Goal-based security components for cloud storage security framework: a preliminary study

@article{Yahya2016GoalbasedSC,
  title={Goal-based security components for cloud storage security framework: a preliminary study},
  author={Fara Yahya and Robert John Walters and Gary B. Wills},
  journal={2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)},
  year={2016},
  pages={1-5}
}
There are a variety of ways to ensure the security of data in the cloud depending on the set of anticipated concerns. Many cloud storage secure data either by encrypting data on transfer, or by encrypting data at rest. These security protections seem very different, and currently there are no common goalbased security components for comparing them. In this paper we investigate the security components forming security, which ensures data are securely protected in cloud storage. We will show… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 24 REFERENCES

Top Threats to Cloud Computing V1.0 Report

  • Gartner, “Newsroom Consumers Will Store More Than a Third of Their Di 2016, ” Press Release, 2012. CSA
  • Cloud
Highly Influential
2 Excerpts

Australian Government Information Security Manual Controls

  • ASD
  • Australian Signals Directorate (ASD), . [Online…
  • 2014
3 Excerpts

Reducing the Cyber Risk in 10 Critical Areas White Paper

  • CPNI
  • Centre for the Protection of National…
  • 2014
1 Excerpt

Strategies to Mitigate Targeted Cyber Intrusions - Mitigation Details

  • ASD
  • Australian Signals Directorate (ASD), . [Online…
  • 2014

Similar Papers

Loading similar papers…