K. Yamaji, Motonori Nakamura, Yasuhiro Nagai, T. Ito, Hiroyuki Sato
{"title":"Specifying a Trust Model for Academic Cloud Services","authors":"K. Yamaji, Motonori Nakamura, Yasuhiro Nagai, T. Ito, Hiroyuki Sato","doi":"10.1109/MobileCloud.2016.23","DOIUrl":null,"url":null,"abstract":"Recently, cloud services have fast emerged as a major form of IT services. They have changed the way of operating global or local services. Notwithstanding these promising features of cloud services, we can see many business sectors that are not very positive for adopting cloud services. One of its major reasons is controllability on security. It is widely believed that a purchasing organization loses control over operation, especially over security when adopting SaaS for their critical businesses. However, the global competition forces business sectors to change their style of thinking. Academia is never an exception. In 2012, Japan AXIES (Academic eXchange for Information Environment and Strategy) released the criteria for adopting cloud services for academic environments. Its scope includes outsourcing major functions of a univeristy management to cloud service providers. In this paper, we analyze the AXIES report in terms of risk analysis. Its security model is analyzed in terms of TPM and SLA. The criticality levels for services are defined. The assurance levels and cloud security levels are required to match a given criticality level. Cloud security model such as CCM and identity trust model such as NIST 800-63 are integrated into a cloudbased trust model.","PeriodicalId":176270,"journal":{"name":"2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MobileCloud.2016.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, cloud services have fast emerged as a major form of IT services. They have changed the way of operating global or local services. Notwithstanding these promising features of cloud services, we can see many business sectors that are not very positive for adopting cloud services. One of its major reasons is controllability on security. It is widely believed that a purchasing organization loses control over operation, especially over security when adopting SaaS for their critical businesses. However, the global competition forces business sectors to change their style of thinking. Academia is never an exception. In 2012, Japan AXIES (Academic eXchange for Information Environment and Strategy) released the criteria for adopting cloud services for academic environments. Its scope includes outsourcing major functions of a univeristy management to cloud service providers. In this paper, we analyze the AXIES report in terms of risk analysis. Its security model is analyzed in terms of TPM and SLA. The criticality levels for services are defined. The assurance levels and cloud security levels are required to match a given criticality level. Cloud security model such as CCM and identity trust model such as NIST 800-63 are integrated into a cloudbased trust model.