0% found this document useful (0 votes)
12 views2 pages

1st&2nd Annotated Bibliographies

The document presents an annotated bibliography on cloud security, highlighting two key papers. The first paper discusses a semantic approach to identify threats and develop compliance models for cloud security, culminating in a user-friendly application for consumers. The second paper addresses critical security challenges in cloud computing and emphasizes the need for a multi-layered security strategy to protect cloud resources.

Uploaded by

varuncv2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

1st&2nd Annotated Bibliographies

The document presents an annotated bibliography on cloud security, highlighting two key papers. The first paper discusses a semantic approach to identify threats and develop compliance models for cloud security, culminating in a user-friendly application for consumers. The second paper addresses critical security challenges in cloud computing and emphasizes the need for a multi-layered security strategy to protect cloud resources.

Uploaded by

varuncv2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Annotated Bibliography on A Semantic Approach to Cloud Security and Compliance

Rajasekhar Reddy Kolagotla, Graduate Student,


California State University Sacramento,
Department of Computer Science
February 3rd, 2023

[1] H. Amit and J. P. Karuna, "A Semantic Approach to Cloud Security and Compliance," in
2015 IEEE 8th International Conference on Cloud Computing, New York, USA, Jun 2015, pp.
1081-1084, doi: 10.1109/CLOUD.2015.157.

Keywords: Cloud Computing, Cloud Security, Security Compliance models, Cloud Security
models.

In this paper, the authors conducted their research on “A Semantic Approach to Cloud Security
and Compliance” to identify the potential threats faced by the cloud consumers. Authors
divided their work into three main contributions. Firstly, they did their extensive research
to find the threats and have determined the compliance models and security controls that
should be put in place to control the risk. Secondly, they developed an ontology
describing the cloud security controls, threats and compliances which is used to capture
and store this information from standards and cloud providers in W3 standard sematic
web languages. Finally, using technologies like PHP, HTML, AJAX web and MySQL
database they developed an application which can be used by consumer organization. It
classifies the security threats faced by the cloud consumers or users and automatically
determines the high-level security and compliance policy controls that have to be
activated for each threat. The application also displays the existing cloud providers that
support these security policies. They developed an easy-to-use cloud security policy
recommendation application for consumers who are planning to move their data into the
cloud but are hesitant due to security concerns as they may not be aware of the security
controls. The authors further research includes other IT compliance models that may be
applicable in the cloud paradigm and determine if they should be incorporated into their
cloud security application to better match complaint cloud providers.

Annotated Bibliography on Cloud Computing Security and Challenges: Issues, Threats, and
Solutions

[2] A. H. Sadeem, A. A. Majid, A. A. Sulaiman and K. E. Salim, "Cloud Computing Security


and Challenges: Issues, Threats, and Solutions," in 2022 5th Conference on Cloud and Internet
of Things (CIoT), Marrakech, Morocco, Mar 2022, pp. 166-172, doi:
10.1109/CIoT53061.2022.9766571.
Keywords: Cloud computing security, Cloud computing management, Cloud computing
implementation, Cybersecurity.

Cloud Computing has become a point of interest to lot of institutions, organizations, companies
and individuals because of its low-cost infrastructure and the services offered by the
cloud providers. However, there are some critical security concerns that emerged and
hindered the evolution of cloud computing. In this paper, the authors mainly focused on
cloud computing security, challenges, issues, threats and solutions by providing detailed
information. The authors provide a comprehensive overview of cloud computing
architectural framework including essential characteristics of cloud computing, different
cloud service models, and cloud deployment models. The authors also included their
research on cloud computing security challenge and issues like cloud storage issues,
identity management and access control, contractual and legal issues, and attacks in cloud
computing in detailed. Additionally, authors suggest that the organizations should adopt a
"defense in depth" approach, which involves using multiple security layers to provide
comprehensive protection for their cloud resources. Ultimately, the authors stress about
the importance of being aware of cloud security issues and choosing appropriate cloud
services provided by cloud providers, to avoid financial and data losses.

You might also like