Audit Mechanism in Information Security Management System of Cloud

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


Cloud computing development has facing an enormous challenge of security issues. Among these, an endpoint security breach in server connection will cause users to lack confidence in the progress of cloud computing. For the issue, we have proposed a PIP mechanism based on an information security management system, network security threats model and PDCA cycle theory to overcome this drawback.  The case study is also provided for preliminary protection of data centers and endpoint host side’s breach in the framework of cloud computing. The contribution aims at the AaaS system can provide preliminary prevention of data centers and endpoint host side’s breach in the framework of cloud computing. Our prevention mechanism, offered from the proactive side of end point machine, not only prevents social engineering attacks but also helps to resolve threats and vulnerabilities.
Copyright © 2017 Praise Worthy Prize - All rights reserved.


Cloud Computing; Information Security Management System; Vulnerability

Full Text:



R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, vol. 25, n. 6, 2009, pp. 599-616.

J. Shiers, Grid today, clouds on the horizon, Computer Physics Communications, vol. 180, n. 4, 2009, pp. 559-563.

A. Rosenthal, P. Mork, M.H. Li, J. Stanford, D. Koester, P. Reynolds, Cloud computing: A new business paradigm for biomedical information sharing, Journal of Biomedical Informatics, vol. 43, n. 2, 2010, pp. 342-353.

V. Chang, Y.-H. Kuo, M. Ramachandran, Cloud computing adoption framework: A security framework for business clouds, Future Generation Computer Systems, vol. 57, 2016, pp. 24-41.

J. Yu, X. Xiao, Y. Zhang, From concept to implementation: The development of the emerging cloud computing industry in China, Telecommunications Policy, vol. 40 n. 2–3, 2016, pp. 130-146.

M. Jensen, J. Schwenk, N. Gruschka, L.L. Iacono, On technical security issues in cloud computing, IEEE International Conference on Cloud Computing, September 21-25, 2009, Bangalore, India.

S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, n. 1, 2011, pp. 1-11.

M.A. Khan, A survey of security issues for cloud computing, Journal of Network and Computer Applications, vol. 71, 2016, pp. 11-29.

M. Howard, D, LeBlanc, Writing secure code, 2nd ed. (Microsoft Press, 2003).

S. Singh, Y.-S. Jeong, J. H. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications, vol. 75, 2016, pp. 200-222.

S. Northcutt, L. Zeltser, S. Winters, K. Kent, R.W. Ritchey, Inside Network Perimeter Security, 2nd Edition (Sams Publishing, 2005).

R. Shaikh, M. Sasikumar, Trust Model for Measuring Security Strength of Cloud Computing Service, Procedia Computer Science, vol. 45, 2015, pp. 380-389.

J. Backhouse, L. Silva, W.Y. Hsu, Circuits of Power in Creating De Jure Standards: Shaping the International IS Security Standard, Management of Information Systems Quarterly, vol. 30 Special Issue, 2006, pp. 413-438.

C. A. Sennewald, C. Baillie, 21 - International Security Standards1, Effective Security Management, 6 (Butterworth-Heinemann, 2016, 205-212).

ISO/IEC 27001: Available at: ogue/catalogue_tc/ catalogue_detail.htm?csnumber=42103.

K. Keahey, I. Foster, T. Freeman, X. Zhang, Virtual Workspaces: Achieving Quality of Service and Quality of Life in the Grid, Scientific Programming, vol. 13 n. 4, 2005, pp. 265-276.

B.H. Krishna, S. Kiran, G. Murali, R.P.K. Reddy, Security Issues in Service Model of Cloud Computing Environment, Procedia Computer Science, vol. 87, 2016, pp. 246-251.

A. Joint, E. Baker, E. Eccles, Hey, you, get off of that cloud?, Computer Law & Security Review, vol. 25 n. 3, 2009, pp. 270-274.

Amazon Elastic Compute Cloud (EC2), Available at:

Windows Azure, Available at: sazure/.

N. Sultan, Cloud computing for education: A new dawn?, International Journal of Information Management, vol. 30 n. 2, 2010, pp. 109-116.

I. Kouatli, “Managing Cloud Computing Environment: Gaining Customer Trust with Security and Ethical Management,” Procedia Computer Science, vol. 91, pp. 412-421, 2016.

N. Stinchcombe, Cloud computing in the spotlight, Infosecurity Today, vol. 6 n. 6, 2009, pp. 30-33.

S. Mansfield-Devine, Danger in the clouds, Network Security, vol. 2008, n. 12, 2008, pp. 9-11.

A.R. Brodtkorb, C. Dyken, T.R. Hagen, J.M. Hjelmervik, O.O. Storaasli, State-of-the-art in heterogeneous computing, Sci. Program., vol. 18, n. 1, 2010, pp. 1-33.

O. Rebollo, D. Mellado, E. Fernández-Medina, and H. Mouratidis, Empirical evaluation of a cloud computing information security governance framework, Information and Software Technology, vol. 58, 2015, pp. 44-57.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize