Evaluation of a Security Service Level Agreement
نویسندگان
چکیده
Data breaches are the most serious security breaks among all types of cybersecurity threats. While Cloud hosting services provide assurances against data loss, understanding the security service level agreements (SSLAs) and privacy policies offered by the service providers empowers consumers to assess risks and costs associated with migrating their information technology (IT) operations to the Cloud. We have developed ontologies to represent security SLAs so that consumers can understand cybersecurity threats, techniques for mitigating the risks, and their roles and responsibilities and those of the service provider in terms of protecting IT systems. Our ontological representation of security services offered by a provider allows the customer to evaluate the level of compliance with respect to federal regulations such as Health Insurance Portability and Accountability Act (HIPAA). In this paper, we also describe ways to quantitatively assess the strength of compliance and the quality of protections offered by an SSLA. We hope that our approach can lead to negotiated SSLAs. Keywords–service level agreement; SLA; security; SSLA; cloud computing.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA broker-based cooperative security-SLA evaluation methodology for personal cloud computing
An underlying cloud computing feature, outsourcing of resources, makes the service-level agreement (SLA) a critical factor for quality of service (QoS), and many researchers have addressed the question of how an SLA can be evaluated. Lately, security SLAs have also received much attention to guarantee security in a user perspective and provide optimal and efficient security service in the secur...
متن کاملNovel Methods For Determining QoS Parameters and Thresholds in End User's Service Level Agreement
Service level agreement (SLA) is a powerful tool to formalize the negotiation and agreement between the service provider and service seeker with the scope of service quality characteristics, compensations and tariffs. The service quality description is the main part of a SLA which can be characterized by the use of suitable and feasible quality of service (QoS) parameters. Determining suitable ...
متن کاملQoS2: a framework for integrating quality of security with quality of service
Different security measures have emerged to encounter various Internet security threats, ensuring a certain level of protection against them. However, this does not come without a price. Indeed, there is a general agreement that high security measures involve high amount of resources, ultimately impacting the perceived Quality of Service (QoS). The objective of this paper is to define a framewo...
متن کامل