SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Computer Networks and Communications Security 
VOL. 1, NO. 3, AUGUST 2013, 95–101 
C 
C 
Available online at: www.ijcncs.org 
N 
ISSN 2308-9830 
S 
SLA Based Information Security Metric for Cloud Computing 
from COBIT 4.1 Framework 
MUHAMMAD IMRAN TARIQ1, DR. IRFAN UL HAQ2, JAVEED IQBAL3 
1M.Phil Student, Department of Computer Science, The University of Lahore, Lahore, Pakistan 
2Solution Architect, Bitmatriks Software Solutions, Islamabad, Pakistan 
3M.Phil Student, Department of Computer Science, The Govt. College University, Faisalabad, Pakistan 
E-mail: 1imrantariqbutt@yahoo.com, 2irfan@email.com, 3javeedy80pk@yahoo.com 
ABSTRACT 
Cloud Computing is one of the rapidly adopted technology in the field of Information and Communication 
Technology (ICT) in which resources (like processor and storage devices) can be rented out and released by 
the Cloud customer by using the Internet in on-demand basis. Information Security issues in Cloud 
Computing hold vital importance as the global economy depends upon the secure flow of information 
within the organization and exchange of information with other organization (private and public Cloud). To 
measure security in Cloud Computing at each level, Information Security metrics are better tools that help 
the organization to take good decisions on the base of qualitative and quantitative analysis, performance 
reports, efficiency and effectiveness of the implemented standard or certification security controls. SLA 
metrics are mostly used to evaluate performance of the service object but not to measure Information 
Security risks. These service objects can be further categorized as Hardware, Software, Network, Storage 
and Help Desk / Service Desk. Each object has its own quality metrics and can be combined to form a 
complex and compound service. COBIT is IT Governance framework which is widely used in IT industry. 
It covers several areas of IT Governance. Information Security is the part of this framework and the same 
part can be used to build SLA based Information Security Metrics in Cloud Computing. To obtain 
Information Security Metrics particularly for Cloud Computing, a criteria have been developed and 
Information Security Metrics are developed accordingly to facilitate both Cloud Customers and Cloud 
Service Providers. 
Keywords: Cloud Computing, Information Security, Security Metrics, Service Level Agreement, COBIT. 
1 INTRODUCTION 
build a mechanism to measure and improve the 
Now in days, the customers are demanding new 
security of their their Cloud system. There are 
Information Technology Services and the Cloud 
several ways to improve the security of the Cloud 
Computing is the new innovation in the paradigm 
system like continuous monitoring of system, 
of Information Technology that offers more 
improvement in the system according to monitor 
services than traditional computing. Although, it 
activities and improve the Information Security in 
has several advantages over traditional computing 
the Cloud [1]. 
but it has several disadvantages i.e. loss of 
The Cloud Service Provider (CSP) always 
governance, malicious insider, backup and 
provides a guarantee to their Customers that their 
recovery, privacy, security, different data protection 
data will be saved and there is no issue regarding 
laws in different countries and etc. Among these 
security, privacy of customer data at their part but 
risks, the Information Security is very critical issues 
in real cases, some time, the Cloud Service 
and it needs more attention of the Cloud venders to 
Providers failed to provide security and privacy in 
secure their customer’s data. Due to these 
the true sense that Cloud Customer required to 
challenges, the Cloud Customers are required to 
maintain its Cloud resources [2]. Moreover, in the
96 
M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
past, the services of CSPs failed and the Cloud 
Customer faced great trouble in its finance [3]. 
Information Security Metrics are the best tools to 
measure the efficiency in quantitative and 
qualitative ways of the Cloud Service Provider. The 
Cloud organizations often used / implement already 
available traditional computing Information 
Security Metrics or develop their own. 
In Cloud Computing, the resources are delivered 
to the Cloud Customers as service and therefore, 
the Cloud organizations are required to implement 
Information Security Metrics through Service Level 
Agreement (SLA). 
The SLA is a legal document that both 
organizations signed after deciding the terms and 
conditions of the agreement. For Cloud Computing, 
the services that are Cloud organizations are going 
to render, included in the agreement and in case of 
violation of agreement from either side, a penalty 
will be imposed on the accused party [4]. 
SLA based Information Security Metrics are 
therefore used to measure the service level between 
Cloud Service Provider and Cloud Customer. The 
SLA is mostly used to measure the performance of 
the Cloud organization than security measurement 
[5]. 
During literature review, it is revealed that the 
several researches have been made in the area of 
security metrics, cloud computing and SLA. 
However, the research community did not focus on 
SLA based information security metrics computing 
especially for Cloud Computing. 
It is also revealed during the literature review of 
different standards and frameworks for information 
security and found that COBIT is the best 
framework to obtain SLA based Information 
Security Metrics in Cloud Computing. 
2 INFORMATION SECURITY METRICS 
Information Security metrics are quantitative 
measurement process to evaluate the organization 
security. Metrics facilitate the organization to take 
better decisions about various aspects of security 
like security architecture and efficiency and 
controls of security operations. 
Some authorities create confusion in term 
Metrics and Measurements but in reality both terms 
have the same meaning and functionality. NIST SP 
800-55 Revision 1 used security measurement term 
and avoids the term security metrics. The first 
version of SP 800-55 was “Security Metrics Guide 
for Information Technology Systems” [6]. 
According to NIST security measurement is 
“Security measures facilitate decision making and 
improve performance and accountability through 
the collection, analysis, and reporting of relevant 
performance-related data” [6]. 
2.1 Attributes of Metrics 
There are several definitions about the good 
metrics attributes [8]. He advises that security 
metrics should be SMART: Specific, Measurable, 
Attainable, Repeatable, and Time-dependent. 
Research by Herrmann stated that the ideal metrics 
should be calculated by a number, cost effective, 
correct and exact [9]. 
The other definition of security metrics is Jaquith 
that metrics are required to be consistent with 
measurement, inexpensive to gather, contextually 
specific and expressed as a number [10]. 
Although, there are several different definitions 
of security metrics, it may be said that in general, 
best metrics are likely to have given below 
characteristics: 
 Metrics must have the capability to measure 
and communicate things in which context 
they are intended. 
 The estimated value of metric not exceed to 
their cost. 
 Measurement method must be low-priced 
and simple to get good results within time. 
 Metrics should be objective and 
quantifiable. Its means metrics can be 
derived through accurate values. 
 Metrics should have the property to be 
consistently reproducible by different 
reviewers. 
 Metrics should be able to be tracked over 
time. 
 It should be consistent in what it measures. 
3 SERVICE LEVEL AGREEMENT 
SLA is a legal and contractual document written 
between Cloud Service Provider (CSP) and Cloud 
Customer. It is about the service levels offered by 
the CSP to the customer [13]. There are several 
advantages of Service Level Agreement but the 
main advantages is the understanding of the 
responsibilities of CSP and customer. In SLA, all 
modalities are defined with the consultation of both 
parties and before writing SLA, both parties 
negotiate each term of the SLA and finalize it.
97 
M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
The SLA defines the term “What” instead of 
“How” [11]. This thing revealed that the SLA 
defines what type of services and their level is the 
customer is expected from the CSP. It also defined 
both parties responsibilities and expected and 
unexpected events that can happen to the service. 
As we know that, in Cloud environment, the 
customer transfers his information and data to the 
CSP and the Cloud Organization does not know 
about the physical location of its data and 
information. Now the Cloud organization can use 
its SLA to assure the security and privacy of its 
data. 
Therefore, it is recommended that while writing 
SLA, both parties should embrace security and 
privacy issues starting from performance. 
4 CONTROL OBJECTIVES FOR 
INFORMATION AND RELATED 
TECHNOLOGY (COBIT) 
According to ISACA, COBIT is IT governance 
framework and provide a catalog of control, it 
supports a tool set that permits organizational 
managers to fill the gap between organizational 
technical issues, organization risk and control 
requirements [12]. It is also known as complete IT 
governance framework required to be implemented 
in large scale enterprise. 
COBIT act as an organization IT system 
governance and control development framework 
and it provides 2 methods: 
1. Defining an Information Technology strategy. 
2. Third-party management services. 
It also offers a maturity model that may employ 
to determine the maturity of the IT governance 
processes of an organization. 
For users of Cloud Computing,adopting of 
COBIT framework procedures, the customer shall 
be able to decide what needs to be done after and 
before the adoption of the cloud’s solution. 
Moreover, the COBIT also helps the organizations 
to monitor the value that is obtained through the 
adoption of Cloud Computing. 
The above said maturity model also assist the 
organization to know IT governance level of 
maturity, this will facilitate to know whether 
maturity level is acceptable or not after the 
adoption of Cloud Computing. 
Hence, by using COBIT, organizations can 
regulate high-quality practices to ensure that IT 
investment is achieving business targets (ITGI, 
2007). In this scenario, COBIT helps organizations 
to ensure that adoption of Cloud services will bring 
good values without negotiation. Figure 1 is overall 
COBIT 4.1 Framework. 
To decide, whether an organization has the 
ability regarding security in Cloud Computing, the 
organization may try this framework answer 
questions regarding governance and best practices. 
Moreover, COBIT used in IT auditing and has the 
ability to use in combination with other Information 
Technology relevant frameworks, certifications and 
standards like ISO 27001 and NIST SP 800-55 
Rev.1. In addition to this, it is very best guide in the 
development of security metrics for Cloud 
Computing. 
Fig. 1. Overall COBIT 4.1 Frameworks. 
5 CRITERIA FOR THE SELECTION OF 
SLA BASED INFORMATION 
SECURITY METRICS 
The following criteria are developed to identify 
manageable, measure-able, the precise number of 
metrics that are related to Information Security 
from COBIT framework. 
The identified metrics can be included in the 
SLA and the both Cloud parties can measure their 
security related issues. 
Table 1: Criteria For The Selection Of SLA Based 
Information Security Metrics From COBIT 
Sr. 
# 
Criteria Remarks 
1 
Relevant to 
Cloud 
Computing? 
There are a number of 
frameworks and standards 
to manage IT infrastructure 
and have some time have
98 
M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
little bit portion of cloud 
computing. 
NIST, COBIT, SANS, ISO 
and etc have a number of 
guides which can be used 
to develop security metrics. 
In these guides, every 
defined control is not 
relevant to cloud 
computing. Therefore, to 
select relevant processes 
for cloud computing, the 
said criteria have been 
developed and it will help 
to select only cloud related 
processes for cloud 
computing. 
2 
Related to 
Information 
Security? 
Framework and standard 
covered and discussed wide 
range of IT governance 
issues of an organization, 
but this project only relates 
to information security. 
The second criteria will 
only pick those processes 
which are relevant to 
information security. 
3 
Applicable 
to any or all 
of cloud 
service 
model 
(SaaS, 
PaaS, IaaS 
and XaaS)? 
This criteria will check that 
whether the selected 
control is applicable to any 
or all of the cloud service 
model. 
Some controls are partially 
relevant to information 
security for cloud 
computing and not fully 
satisfy the criteria. 
4 
Fulfill the 
criteria to 
be selected 
as control? 
Selection of a control is a 
very critical process and 
during the selection of 
processes, if process fulfills 
the requirements of its 
characteristics then it will 
be selected otherwise drop. 
For example, if the 
processes cost is too high 
then its risk then it will not 
selected. 
5 
Suitable to 
be included 
in the SLA 
for Cloud? 
This is the second last 
criteria in which control 
suitability will be checked, 
every process is not 
suitable to be included in 
the SLA. Therefore, 
processes which are 
relevant to SLA will be 
selected. 
6 
Related to 
subject 
study? 
The last criteria is not strict, 
here, it will only check that 
whether this process is 
related to subject study or 
not? 
The COBIT IT Governance framework has 34 
different processes for the governance of IT 
infrastructure of an organization. Every process has 
a separate function and in Cloud scenario, all these 
controls are not applicable as the Cloud Customer 
data processes on CSP site. The COBIT 4.1 
processes are given in Table 2. 
Table 2: List Of The COBIT 4.1 Processes 
Control 
ID Control Name 
PO1 Define a Strategic IT Plan 
PO2 Define the Information Architecture 
PO3 Determine Technological Direction 
PO4 Define the IT Processes, Organization 
and Relationships 
PO5 Manage the IT Investment 
PO6 Communicate Management Aims and 
Direction 
PO7 Manage IT Human Resources 
PO8 Manage Quality 
PO9 Assess and Manage IT Risks 
PO10 Manage Projects 
AI1 Identify Automated Solutions 
AI2 Acquire and Maintain Application 
Software 
AI3 Acquire and Maintain Technology 
Infrastructure 
AI4 Enable Operation and Use 
AI5 Procure IT Resources 
AI6 Manage Changes 
AI7 Install and Accredit Solutions and 
Changes 
DS1 Define and Manage Service Level 
DS2 Manage Third-party Services 
DS3 Manage Performance and Capacity 
DS4 Ensure Continuous Service 
DS5 Ensure Systems Security 
DS6 Identify and Allocate Costs 
DS7 Educate and Train Users 
DS8 Manage Service Desk and Incidents 
DS9 Manage the Configuration 
DS10 Manage Problems 
DS11 Manage Data 
DS12 Manage the Physical Environment 
DS13 Manage Operations 
ME1 Monitor and Evaluate IT Performance
99 
M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
ME2 Monitor and Evaluate Internal Control 
ME3 Ensure Compliance With External 
Requirements 
ME4 Provide IT Governance 
To obtain Information Security Metrics, the 
Cloud organization initially has to select the 
relevant processes from the COBIT framework. 
Therefore, the criteria made in Table 1 apply on 
COBIT 4.1 framework and each process of the said 
framework is evaluated according to the criteria. 
The Table 3 shows the implementation of the 
criteria. 
Table 3: SELECTION OF SECURITY PROCESSES FOR 
CLOUD SLA FROM COBIT 4.1 FRAMEWORK 
Control 
ID 
Metrics selection criteria Serial 
Number 
1 2 3 4 5 6 
PO1 No No No No No No 
PO2 Yes Yes Yes Yes No No 
PO3 Yes Yes Yes Yes No No 
PO4 Yes Yes Yes Yes No Yes 
PO5 Yes Yes Yes Yes No Yes 
PO6 Yes Yes Yes No No No 
PO7 Yes Yes Yes No No No 
PO8 Yes Yes Yes Yes No Yes 
PO9 Yes Yes Yes Yes Yes Yes 
PO10 No No No No No No 
AI1 Yes Yes Yes Yes No Yes 
AI2 Yes Yes Yes Yes Yes Yes 
AI3 Yes Yes Yes Yes Yes Yes 
AI4 Yes Yes Yes Yes Yes Yes 
AI5 Yes Yes Yes Yes No Yes 
AI6 Yes Yes Yes Yes No Yes 
AI7 Yes Yes Yes Yes No Yes 
DS1 Yes Yes Yes Yes No No 
DS2 Yes Yes Yes Yes Yes Yes 
DS3 Yes Yes Yes Yes Yes Yes 
DS4 Yes Yes Yes Yes Yes Yes 
DS5 Yes Yes Yes Yes Yes Yes 
DS6 No No No No No No 
DS7 Yes No No No No No 
DS8 Yes Yes Yes Yes Yes Yes 
DS9 Yes Yes Yes Yes Yes Yes 
DS10 Yes Yes Yes Yes Yes Yes 
DS11 Yes Yes Yes Yes Yes Yes 
DS12 Yes Yes Yes Yes No No 
DS13 Yes Yes Yes Yes Yes Yes 
ME1 Yes Yes Yes Yes Yes Yes 
ME2 Yes Yes Yes Yes Yes Yes 
ME3 Yes Yes Yes Yes Yes Yes 
ME4 Yes Yes No No No No 
After applying the criteria, we found that only 14 
processes met process selection criteria and theses 
processes are given as under in Table 4. 
Table 4: COBIT 4.1 Processes That Met Criteria 
Control 
ID Control Name 
PO9 Assess and Manage IT Risks 
AI2 Acquire and Maintain Application 
Software 
AI3 Acquire and Maintain Technology 
Infrastructure 
AI4 Enable Operation and Use 
DS2 Manage Third-party Services 
DS3 Manage Performance and Capacity 
DS4 Ensure Continuous Service 
DS5 Ensure Systems Security 
DS8 Manage Service Desk and Incidents 
DS9 Manage the Configuration 
DS10 Manage Problems 
DS11 Manage Data 
ME1 Monitor and Evaluate IT Performance 
ME2 Monitor and Evaluate Internal Control 
ME3 Ensure Compliance With External 
Requirements 
It is worthwhile to mention here that every 
process of the COBIT framework has a number of 
metrics. The total number of metrics in COBIT 
framework for IT Governance is 340 and the 
domain Deliver and Support (DS) has 120 metrics. 
The Table 5 describes detailed about COBIT 
processes and its respective number of metrics. 
Table 5: COBIT 4.1 Processes and Metrics 
Process Metrics Percentage 
Plan and Organize (PO) 103 30% 
Acquire and Implement 
(AI) 73 22% 
Deliver and Support 
(DS) 120 35% 
Monitor and Evaluate 
(ME) 44 13% 
Total 340 
The COBIT framework numbers of metrics in 
percentage are shown in Figure 2.
100 
M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 2. Distribution Of Metrics In The Four Domains Of 
COBIT Framework. 
These metrics are very huge and it is hard for an 
organization to maintain their data plus these 
metrics are not cost effective for Cloud Customers. 
Moreover, these all metrics are not relevant to 
Cloud Computing as our results show that in 
Deliver and Support (DS) domain only DS2 to DS5 
and DS8 to DS11 are relevant processes for Cloud 
SLA. 
The number of identified metrics from COBIT 
framework processes for Cloud Computing 
according to criteria are as given in Table 6. 
Table 6: Number Of Identified Metrics 
Process Metrics Percentage 
Plan and Organize (PO) 12 4% 
Acquire and Implement 
(AI) 29 9% 
Deliver and Support 
(DS) 77 23% 
Monitor and Evaluate 
(ME) 32 9% 
Total 150 44% 
Fig. 3. Effectiveness of COBIT Framework Process 
For Cloud Computing 
The Figure 3 shows that it has only 4% processes 
for Cloud Computing, Acquire and Implement (AI) 
and Monitor and Evaluate domains / process have 
9% metrics and the Deliver and Support domain / 
process has 23% metrics for Cloud Computing. 
If we consolidate these four domains / process 
metrics then we come to know that COBIT 
framework 44% metrics can be used in Cloud 
Computing. 
Every Cloud organization has its own 
requirements and implementation of metrics are 
depends up the type of Cloud deployment model 
and Service Model. Furthermore, the Cloud 
organizations some time deploy Hybrid Cloud 
deployment model and obtain partial services from 
CSP. The use of metrics for security and privacy 
vary organization to organization. While selecting 
metrics for security, the organizations have to keep 
its mind about the characteristics of the good 
metrics. There are various characteristics of good 
metrics and as per our research, the Jaquith metrics 
are sufficient for the selection of good metrics [9]. 
The results shown in Table 4 depicts that the 
organizations who are intended to maintain their 
privacy and security of data may implement COBIT 
4.1 framework in their organizations and the 
identified process are relevant to security and 
privacy domains. These domains have sufficient 
metrics and Cloud organizations have to implement 
the metrics that fulfil their needs and requirements 
according to Cloud services they rendered from 
CSPs. 
6 CONCLUSION AND FUTURE WORK 
Cloud Computing is a very growing technology 
due to its elastic and on demand services to Cloud 
Customers. It has several advantages over 
traditional computing but it is not as such mature 
technology which provide 100% security and 
privacy guarantees. Due to new technology, Cloud 
potential customers are facing some roadblocks in 
its deployment and security is the top most security 
risk for Cloud organizations. 
To overcome these security issues, the Cloud 
organizations have to implement Information 
Security standards, guides, certifications and 
frameworks to protect data. COBIT is the world 
wide acceptable IT Governance framework and it 
has Information Security domains that are sufficient 
to provide security to Cloud organizations. The 
COBIT identified processes for the development of 
Information Security metrics can be used in SLA. 
The said framework has 340 metrics and these are 
partially related to the Cloud technology. The 
criteria made in this research, identified only those
101 
M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
processes that are relevant to Cloud technology and 
easy to implement in the Cloud environment to 
protect Cloud organization data. We recommend to 
Cloud organizations to select only those metrics 
which fulfill their organization's needs and satisfy 
the criteria of good metrics. The selected metrics 
should be quantitative and produce the results 
numeric figure. Moreover, the selected metrics 
should be cost effective and easy to measure. 
The selected metrics from identified processes 
should be become the part of the SLA and the CSP 
should bound to provide requisite information 
relating to metrics to Cloud Customers. 
The future plan is to identify SLA based 
information security metrics from ISO / IEC 
27001:2005 certification and NIST SP 800-53 
Rev.4 standard. A criteria will be made to know 
that up to what level of security these standards and 
certifications are provided to Cloud Customers. 
7 REFERENCES 
[1] Tariq, Muhammad Imran, "Towards 
Information Security Metrics Framework for 
Cloud Computing." International Journal of 
Cloud Computing and Services Science (IJ-CLOSER), 
2012, pp. 209-217. 
[2] Takabi, Hassan, James BD Joshi, and Gail- 
Joon Ahn, "Security and privacy challenges in 
cloud computing environments", Security & 
Privacy, IEEE, 2010, pp. 24-31. 
[3] Blate, Alex, and Kevin Jeffay. "Gini in A 
Bottle: A Case Study of Pareto’s Principle in 
the Wild." International Journal of Computer 
Networks and Communications Security 1 
(2013). 
[4] T.S. Kandukuri, Balachandra Reddy, V. 
Ramakrishna Paturi, and Atanu Rakshi, "Cloud 
security issues", In Services Computing, 2009. 
SCC'09. IEEE International Conference, 2009, 
pp. 517-520. 
[5] Paschke, Adrian, and Elisabeth Schnappinger- 
Gerull, "A Categorization Scheme for SLA 
Metrics" Service Oriented Electronic 
Commerce, 2006, pp. 25-40. 
[6] Swanson, M., Bartol, N., Sabato, J., Hash, J., 
Graffo, L., “Security metrics guide for 
information technology systems (NIST SP 
800-55)”, National Institute of Standards and 
Technology, 2003. 
[7] Nelson, C., "Security Metrics: An Overview", 
ISSA Journal, 2010, pp.12-18. 
[8] Jelen, George, "SSE-CMM security metrics", 
In NIST and CSSPAB Workshop, 2000. 
[9] Herrmann, Debra S., “Complete guide to 
security and privacy metrics: measuring 
regulatory compliance, operational resilience, 
and ROI”, CRC Press, 2007. 
[10] Jaquith, Andrew, “Security metrics: replacing 
fear, uncertainty, and doubt”, Upper Saddle 
River: Addison-Wesley, 2007. 
[11] De Chaves, Shirlei Aparecida, Carlos Becker 
Westphall, and Flavio Rodrigo Lamin, "SLA 
perspective in security management for cloud 
computing" In Networking and Services 
(ICNS), 2010 Sixth International Conference, 
IEEE, 2010, pp. 212-217. 
[12] Catteddu, Daniele. “Cloud Computing: 
benefits, risks and recommendations for 
information security”, Springer Berlin 
Heidelberg, 2010. 
[13] Ul Haq, Irfan, Altaf Huqqani, and Erich 
Schikuta, "Aggregating hierarchical service 
level agreements in business value networks" 
In Business Process Management, Springer 
Berlin Heidelberg, 2009, pp. 176-192.

More Related Content

What's hot

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountabilityeSAT Publishing House
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performanceijccsa
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 

What's hot (20)

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performance
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 

Viewers also liked

A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...ijcncs
 
Dolly Parton
Dolly PartonDolly Parton
Dolly Partonmlmabry
 
State of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic AssessmentState of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic Assessmentijcncs
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...ijcncs
 
Implementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningImplementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningIE Private Consulting in PM & ITSM
 
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the WildGini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wildijcncs
 
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM DriveDesign of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM Driveijcncs
 
Walt Disney
Walt DisneyWalt Disney
Walt Disneymlmabry
 
Call Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersCall Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersIE Private Consulting in PM & ITSM
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
 
Ray Charles
Ray CharlesRay Charles
Ray Charlesmlmabry
 
Brief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesBrief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesIE Private Consulting in PM & ITSM
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 

Viewers also liked (20)

A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
 
Dolly Parton
Dolly PartonDolly Parton
Dolly Parton
 
Implementing e learning and combined training methods
Implementing e learning and combined training methodsImplementing e learning and combined training methods
Implementing e learning and combined training methods
 
State of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic AssessmentState of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic Assessment
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
 
Implementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningImplementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learning
 
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the WildGini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
 
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM DriveDesign of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
 
Walt Disney
Walt DisneyWalt Disney
Walt Disney
 
Virtual learning in 15 minutes
Virtual learning in 15 minutesVirtual learning in 15 minutes
Virtual learning in 15 minutes
 
PMP and CCR updates in 2015
PMP and CCR updates in 2015PMP and CCR updates in 2015
PMP and CCR updates in 2015
 
Call Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersCall Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centers
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
Ray Charles
Ray CharlesRay Charles
Ray Charles
 
Brief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesBrief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approaches
 
Combining Waterfall and Adaptive practice in IT projects
Combining Waterfall and Adaptive practice in IT projectsCombining Waterfall and Adaptive practice in IT projects
Combining Waterfall and Adaptive practice in IT projects
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
Microsoft Abbreviations Dictionary
Microsoft Abbreviations DictionaryMicrosoft Abbreviations Dictionary
Microsoft Abbreviations Dictionary
 
IT Service management for non-IT managers (CEO and others)
IT Service management for non-IT managers (CEO and others)IT Service management for non-IT managers (CEO and others)
IT Service management for non-IT managers (CEO and others)
 

Similar to SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework

ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGijitcs
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing IJCSIS Research Publications
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment reportAhmad El Tawil
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 

Similar to SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework (20)

ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment report
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
J3602068071
J3602068071J3602068071
J3602068071
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework

  • 1. International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 95–101 C C Available online at: www.ijcncs.org N ISSN 2308-9830 S SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework MUHAMMAD IMRAN TARIQ1, DR. IRFAN UL HAQ2, JAVEED IQBAL3 1M.Phil Student, Department of Computer Science, The University of Lahore, Lahore, Pakistan 2Solution Architect, Bitmatriks Software Solutions, Islamabad, Pakistan 3M.Phil Student, Department of Computer Science, The Govt. College University, Faisalabad, Pakistan E-mail: 1imrantariqbutt@yahoo.com, 2irfan@email.com, 3javeedy80pk@yahoo.com ABSTRACT Cloud Computing is one of the rapidly adopted technology in the field of Information and Communication Technology (ICT) in which resources (like processor and storage devices) can be rented out and released by the Cloud customer by using the Internet in on-demand basis. Information Security issues in Cloud Computing hold vital importance as the global economy depends upon the secure flow of information within the organization and exchange of information with other organization (private and public Cloud). To measure security in Cloud Computing at each level, Information Security metrics are better tools that help the organization to take good decisions on the base of qualitative and quantitative analysis, performance reports, efficiency and effectiveness of the implemented standard or certification security controls. SLA metrics are mostly used to evaluate performance of the service object but not to measure Information Security risks. These service objects can be further categorized as Hardware, Software, Network, Storage and Help Desk / Service Desk. Each object has its own quality metrics and can be combined to form a complex and compound service. COBIT is IT Governance framework which is widely used in IT industry. It covers several areas of IT Governance. Information Security is the part of this framework and the same part can be used to build SLA based Information Security Metrics in Cloud Computing. To obtain Information Security Metrics particularly for Cloud Computing, a criteria have been developed and Information Security Metrics are developed accordingly to facilitate both Cloud Customers and Cloud Service Providers. Keywords: Cloud Computing, Information Security, Security Metrics, Service Level Agreement, COBIT. 1 INTRODUCTION build a mechanism to measure and improve the Now in days, the customers are demanding new security of their their Cloud system. There are Information Technology Services and the Cloud several ways to improve the security of the Cloud Computing is the new innovation in the paradigm system like continuous monitoring of system, of Information Technology that offers more improvement in the system according to monitor services than traditional computing. Although, it activities and improve the Information Security in has several advantages over traditional computing the Cloud [1]. but it has several disadvantages i.e. loss of The Cloud Service Provider (CSP) always governance, malicious insider, backup and provides a guarantee to their Customers that their recovery, privacy, security, different data protection data will be saved and there is no issue regarding laws in different countries and etc. Among these security, privacy of customer data at their part but risks, the Information Security is very critical issues in real cases, some time, the Cloud Service and it needs more attention of the Cloud venders to Providers failed to provide security and privacy in secure their customer’s data. Due to these the true sense that Cloud Customer required to challenges, the Cloud Customers are required to maintain its Cloud resources [2]. Moreover, in the
  • 2. 96 M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 past, the services of CSPs failed and the Cloud Customer faced great trouble in its finance [3]. Information Security Metrics are the best tools to measure the efficiency in quantitative and qualitative ways of the Cloud Service Provider. The Cloud organizations often used / implement already available traditional computing Information Security Metrics or develop their own. In Cloud Computing, the resources are delivered to the Cloud Customers as service and therefore, the Cloud organizations are required to implement Information Security Metrics through Service Level Agreement (SLA). The SLA is a legal document that both organizations signed after deciding the terms and conditions of the agreement. For Cloud Computing, the services that are Cloud organizations are going to render, included in the agreement and in case of violation of agreement from either side, a penalty will be imposed on the accused party [4]. SLA based Information Security Metrics are therefore used to measure the service level between Cloud Service Provider and Cloud Customer. The SLA is mostly used to measure the performance of the Cloud organization than security measurement [5]. During literature review, it is revealed that the several researches have been made in the area of security metrics, cloud computing and SLA. However, the research community did not focus on SLA based information security metrics computing especially for Cloud Computing. It is also revealed during the literature review of different standards and frameworks for information security and found that COBIT is the best framework to obtain SLA based Information Security Metrics in Cloud Computing. 2 INFORMATION SECURITY METRICS Information Security metrics are quantitative measurement process to evaluate the organization security. Metrics facilitate the organization to take better decisions about various aspects of security like security architecture and efficiency and controls of security operations. Some authorities create confusion in term Metrics and Measurements but in reality both terms have the same meaning and functionality. NIST SP 800-55 Revision 1 used security measurement term and avoids the term security metrics. The first version of SP 800-55 was “Security Metrics Guide for Information Technology Systems” [6]. According to NIST security measurement is “Security measures facilitate decision making and improve performance and accountability through the collection, analysis, and reporting of relevant performance-related data” [6]. 2.1 Attributes of Metrics There are several definitions about the good metrics attributes [8]. He advises that security metrics should be SMART: Specific, Measurable, Attainable, Repeatable, and Time-dependent. Research by Herrmann stated that the ideal metrics should be calculated by a number, cost effective, correct and exact [9]. The other definition of security metrics is Jaquith that metrics are required to be consistent with measurement, inexpensive to gather, contextually specific and expressed as a number [10]. Although, there are several different definitions of security metrics, it may be said that in general, best metrics are likely to have given below characteristics:  Metrics must have the capability to measure and communicate things in which context they are intended.  The estimated value of metric not exceed to their cost.  Measurement method must be low-priced and simple to get good results within time.  Metrics should be objective and quantifiable. Its means metrics can be derived through accurate values.  Metrics should have the property to be consistently reproducible by different reviewers.  Metrics should be able to be tracked over time.  It should be consistent in what it measures. 3 SERVICE LEVEL AGREEMENT SLA is a legal and contractual document written between Cloud Service Provider (CSP) and Cloud Customer. It is about the service levels offered by the CSP to the customer [13]. There are several advantages of Service Level Agreement but the main advantages is the understanding of the responsibilities of CSP and customer. In SLA, all modalities are defined with the consultation of both parties and before writing SLA, both parties negotiate each term of the SLA and finalize it.
  • 3. 97 M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 The SLA defines the term “What” instead of “How” [11]. This thing revealed that the SLA defines what type of services and their level is the customer is expected from the CSP. It also defined both parties responsibilities and expected and unexpected events that can happen to the service. As we know that, in Cloud environment, the customer transfers his information and data to the CSP and the Cloud Organization does not know about the physical location of its data and information. Now the Cloud organization can use its SLA to assure the security and privacy of its data. Therefore, it is recommended that while writing SLA, both parties should embrace security and privacy issues starting from performance. 4 CONTROL OBJECTIVES FOR INFORMATION AND RELATED TECHNOLOGY (COBIT) According to ISACA, COBIT is IT governance framework and provide a catalog of control, it supports a tool set that permits organizational managers to fill the gap between organizational technical issues, organization risk and control requirements [12]. It is also known as complete IT governance framework required to be implemented in large scale enterprise. COBIT act as an organization IT system governance and control development framework and it provides 2 methods: 1. Defining an Information Technology strategy. 2. Third-party management services. It also offers a maturity model that may employ to determine the maturity of the IT governance processes of an organization. For users of Cloud Computing,adopting of COBIT framework procedures, the customer shall be able to decide what needs to be done after and before the adoption of the cloud’s solution. Moreover, the COBIT also helps the organizations to monitor the value that is obtained through the adoption of Cloud Computing. The above said maturity model also assist the organization to know IT governance level of maturity, this will facilitate to know whether maturity level is acceptable or not after the adoption of Cloud Computing. Hence, by using COBIT, organizations can regulate high-quality practices to ensure that IT investment is achieving business targets (ITGI, 2007). In this scenario, COBIT helps organizations to ensure that adoption of Cloud services will bring good values without negotiation. Figure 1 is overall COBIT 4.1 Framework. To decide, whether an organization has the ability regarding security in Cloud Computing, the organization may try this framework answer questions regarding governance and best practices. Moreover, COBIT used in IT auditing and has the ability to use in combination with other Information Technology relevant frameworks, certifications and standards like ISO 27001 and NIST SP 800-55 Rev.1. In addition to this, it is very best guide in the development of security metrics for Cloud Computing. Fig. 1. Overall COBIT 4.1 Frameworks. 5 CRITERIA FOR THE SELECTION OF SLA BASED INFORMATION SECURITY METRICS The following criteria are developed to identify manageable, measure-able, the precise number of metrics that are related to Information Security from COBIT framework. The identified metrics can be included in the SLA and the both Cloud parties can measure their security related issues. Table 1: Criteria For The Selection Of SLA Based Information Security Metrics From COBIT Sr. # Criteria Remarks 1 Relevant to Cloud Computing? There are a number of frameworks and standards to manage IT infrastructure and have some time have
  • 4. 98 M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 little bit portion of cloud computing. NIST, COBIT, SANS, ISO and etc have a number of guides which can be used to develop security metrics. In these guides, every defined control is not relevant to cloud computing. Therefore, to select relevant processes for cloud computing, the said criteria have been developed and it will help to select only cloud related processes for cloud computing. 2 Related to Information Security? Framework and standard covered and discussed wide range of IT governance issues of an organization, but this project only relates to information security. The second criteria will only pick those processes which are relevant to information security. 3 Applicable to any or all of cloud service model (SaaS, PaaS, IaaS and XaaS)? This criteria will check that whether the selected control is applicable to any or all of the cloud service model. Some controls are partially relevant to information security for cloud computing and not fully satisfy the criteria. 4 Fulfill the criteria to be selected as control? Selection of a control is a very critical process and during the selection of processes, if process fulfills the requirements of its characteristics then it will be selected otherwise drop. For example, if the processes cost is too high then its risk then it will not selected. 5 Suitable to be included in the SLA for Cloud? This is the second last criteria in which control suitability will be checked, every process is not suitable to be included in the SLA. Therefore, processes which are relevant to SLA will be selected. 6 Related to subject study? The last criteria is not strict, here, it will only check that whether this process is related to subject study or not? The COBIT IT Governance framework has 34 different processes for the governance of IT infrastructure of an organization. Every process has a separate function and in Cloud scenario, all these controls are not applicable as the Cloud Customer data processes on CSP site. The COBIT 4.1 processes are given in Table 2. Table 2: List Of The COBIT 4.1 Processes Control ID Control Name PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO3 Determine Technological Direction PO4 Define the IT Processes, Organization and Relationships PO5 Manage the IT Investment PO6 Communicate Management Aims and Direction PO7 Manage IT Human Resources PO8 Manage Quality PO9 Assess and Manage IT Risks PO10 Manage Projects AI1 Identify Automated Solutions AI2 Acquire and Maintain Application Software AI3 Acquire and Maintain Technology Infrastructure AI4 Enable Operation and Use AI5 Procure IT Resources AI6 Manage Changes AI7 Install and Accredit Solutions and Changes DS1 Define and Manage Service Level DS2 Manage Third-party Services DS3 Manage Performance and Capacity DS4 Ensure Continuous Service DS5 Ensure Systems Security DS6 Identify and Allocate Costs DS7 Educate and Train Users DS8 Manage Service Desk and Incidents DS9 Manage the Configuration DS10 Manage Problems DS11 Manage Data DS12 Manage the Physical Environment DS13 Manage Operations ME1 Monitor and Evaluate IT Performance
  • 5. 99 M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 ME2 Monitor and Evaluate Internal Control ME3 Ensure Compliance With External Requirements ME4 Provide IT Governance To obtain Information Security Metrics, the Cloud organization initially has to select the relevant processes from the COBIT framework. Therefore, the criteria made in Table 1 apply on COBIT 4.1 framework and each process of the said framework is evaluated according to the criteria. The Table 3 shows the implementation of the criteria. Table 3: SELECTION OF SECURITY PROCESSES FOR CLOUD SLA FROM COBIT 4.1 FRAMEWORK Control ID Metrics selection criteria Serial Number 1 2 3 4 5 6 PO1 No No No No No No PO2 Yes Yes Yes Yes No No PO3 Yes Yes Yes Yes No No PO4 Yes Yes Yes Yes No Yes PO5 Yes Yes Yes Yes No Yes PO6 Yes Yes Yes No No No PO7 Yes Yes Yes No No No PO8 Yes Yes Yes Yes No Yes PO9 Yes Yes Yes Yes Yes Yes PO10 No No No No No No AI1 Yes Yes Yes Yes No Yes AI2 Yes Yes Yes Yes Yes Yes AI3 Yes Yes Yes Yes Yes Yes AI4 Yes Yes Yes Yes Yes Yes AI5 Yes Yes Yes Yes No Yes AI6 Yes Yes Yes Yes No Yes AI7 Yes Yes Yes Yes No Yes DS1 Yes Yes Yes Yes No No DS2 Yes Yes Yes Yes Yes Yes DS3 Yes Yes Yes Yes Yes Yes DS4 Yes Yes Yes Yes Yes Yes DS5 Yes Yes Yes Yes Yes Yes DS6 No No No No No No DS7 Yes No No No No No DS8 Yes Yes Yes Yes Yes Yes DS9 Yes Yes Yes Yes Yes Yes DS10 Yes Yes Yes Yes Yes Yes DS11 Yes Yes Yes Yes Yes Yes DS12 Yes Yes Yes Yes No No DS13 Yes Yes Yes Yes Yes Yes ME1 Yes Yes Yes Yes Yes Yes ME2 Yes Yes Yes Yes Yes Yes ME3 Yes Yes Yes Yes Yes Yes ME4 Yes Yes No No No No After applying the criteria, we found that only 14 processes met process selection criteria and theses processes are given as under in Table 4. Table 4: COBIT 4.1 Processes That Met Criteria Control ID Control Name PO9 Assess and Manage IT Risks AI2 Acquire and Maintain Application Software AI3 Acquire and Maintain Technology Infrastructure AI4 Enable Operation and Use DS2 Manage Third-party Services DS3 Manage Performance and Capacity DS4 Ensure Continuous Service DS5 Ensure Systems Security DS8 Manage Service Desk and Incidents DS9 Manage the Configuration DS10 Manage Problems DS11 Manage Data ME1 Monitor and Evaluate IT Performance ME2 Monitor and Evaluate Internal Control ME3 Ensure Compliance With External Requirements It is worthwhile to mention here that every process of the COBIT framework has a number of metrics. The total number of metrics in COBIT framework for IT Governance is 340 and the domain Deliver and Support (DS) has 120 metrics. The Table 5 describes detailed about COBIT processes and its respective number of metrics. Table 5: COBIT 4.1 Processes and Metrics Process Metrics Percentage Plan and Organize (PO) 103 30% Acquire and Implement (AI) 73 22% Deliver and Support (DS) 120 35% Monitor and Evaluate (ME) 44 13% Total 340 The COBIT framework numbers of metrics in percentage are shown in Figure 2.
  • 6. 100 M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 2. Distribution Of Metrics In The Four Domains Of COBIT Framework. These metrics are very huge and it is hard for an organization to maintain their data plus these metrics are not cost effective for Cloud Customers. Moreover, these all metrics are not relevant to Cloud Computing as our results show that in Deliver and Support (DS) domain only DS2 to DS5 and DS8 to DS11 are relevant processes for Cloud SLA. The number of identified metrics from COBIT framework processes for Cloud Computing according to criteria are as given in Table 6. Table 6: Number Of Identified Metrics Process Metrics Percentage Plan and Organize (PO) 12 4% Acquire and Implement (AI) 29 9% Deliver and Support (DS) 77 23% Monitor and Evaluate (ME) 32 9% Total 150 44% Fig. 3. Effectiveness of COBIT Framework Process For Cloud Computing The Figure 3 shows that it has only 4% processes for Cloud Computing, Acquire and Implement (AI) and Monitor and Evaluate domains / process have 9% metrics and the Deliver and Support domain / process has 23% metrics for Cloud Computing. If we consolidate these four domains / process metrics then we come to know that COBIT framework 44% metrics can be used in Cloud Computing. Every Cloud organization has its own requirements and implementation of metrics are depends up the type of Cloud deployment model and Service Model. Furthermore, the Cloud organizations some time deploy Hybrid Cloud deployment model and obtain partial services from CSP. The use of metrics for security and privacy vary organization to organization. While selecting metrics for security, the organizations have to keep its mind about the characteristics of the good metrics. There are various characteristics of good metrics and as per our research, the Jaquith metrics are sufficient for the selection of good metrics [9]. The results shown in Table 4 depicts that the organizations who are intended to maintain their privacy and security of data may implement COBIT 4.1 framework in their organizations and the identified process are relevant to security and privacy domains. These domains have sufficient metrics and Cloud organizations have to implement the metrics that fulfil their needs and requirements according to Cloud services they rendered from CSPs. 6 CONCLUSION AND FUTURE WORK Cloud Computing is a very growing technology due to its elastic and on demand services to Cloud Customers. It has several advantages over traditional computing but it is not as such mature technology which provide 100% security and privacy guarantees. Due to new technology, Cloud potential customers are facing some roadblocks in its deployment and security is the top most security risk for Cloud organizations. To overcome these security issues, the Cloud organizations have to implement Information Security standards, guides, certifications and frameworks to protect data. COBIT is the world wide acceptable IT Governance framework and it has Information Security domains that are sufficient to provide security to Cloud organizations. The COBIT identified processes for the development of Information Security metrics can be used in SLA. The said framework has 340 metrics and these are partially related to the Cloud technology. The criteria made in this research, identified only those
  • 7. 101 M. I. Tariq et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 processes that are relevant to Cloud technology and easy to implement in the Cloud environment to protect Cloud organization data. We recommend to Cloud organizations to select only those metrics which fulfill their organization's needs and satisfy the criteria of good metrics. The selected metrics should be quantitative and produce the results numeric figure. Moreover, the selected metrics should be cost effective and easy to measure. The selected metrics from identified processes should be become the part of the SLA and the CSP should bound to provide requisite information relating to metrics to Cloud Customers. The future plan is to identify SLA based information security metrics from ISO / IEC 27001:2005 certification and NIST SP 800-53 Rev.4 standard. A criteria will be made to know that up to what level of security these standards and certifications are provided to Cloud Customers. 7 REFERENCES [1] Tariq, Muhammad Imran, "Towards Information Security Metrics Framework for Cloud Computing." International Journal of Cloud Computing and Services Science (IJ-CLOSER), 2012, pp. 209-217. [2] Takabi, Hassan, James BD Joshi, and Gail- Joon Ahn, "Security and privacy challenges in cloud computing environments", Security & Privacy, IEEE, 2010, pp. 24-31. [3] Blate, Alex, and Kevin Jeffay. "Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild." International Journal of Computer Networks and Communications Security 1 (2013). [4] T.S. Kandukuri, Balachandra Reddy, V. Ramakrishna Paturi, and Atanu Rakshi, "Cloud security issues", In Services Computing, 2009. SCC'09. IEEE International Conference, 2009, pp. 517-520. [5] Paschke, Adrian, and Elisabeth Schnappinger- Gerull, "A Categorization Scheme for SLA Metrics" Service Oriented Electronic Commerce, 2006, pp. 25-40. [6] Swanson, M., Bartol, N., Sabato, J., Hash, J., Graffo, L., “Security metrics guide for information technology systems (NIST SP 800-55)”, National Institute of Standards and Technology, 2003. [7] Nelson, C., "Security Metrics: An Overview", ISSA Journal, 2010, pp.12-18. [8] Jelen, George, "SSE-CMM security metrics", In NIST and CSSPAB Workshop, 2000. [9] Herrmann, Debra S., “Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI”, CRC Press, 2007. [10] Jaquith, Andrew, “Security metrics: replacing fear, uncertainty, and doubt”, Upper Saddle River: Addison-Wesley, 2007. [11] De Chaves, Shirlei Aparecida, Carlos Becker Westphall, and Flavio Rodrigo Lamin, "SLA perspective in security management for cloud computing" In Networking and Services (ICNS), 2010 Sixth International Conference, IEEE, 2010, pp. 212-217. [12] Catteddu, Daniele. “Cloud Computing: benefits, risks and recommendations for information security”, Springer Berlin Heidelberg, 2010. [13] Ul Haq, Irfan, Altaf Huqqani, and Erich Schikuta, "Aggregating hierarchical service level agreements in business value networks" In Business Process Management, Springer Berlin Heidelberg, 2009, pp. 176-192.