Related Work: Framework for Evaluating Internal Controls in a Cloud Computing
Citation
MLA Style: Vinícius Batista Peçanha, Tiago Bittencourt Nazaré, Raissa Batista Peçanha "Related Work: Framework for Evaluating Internal Controls in a Cloud Computing" International Journal of Engineering Trends and Technology 66.1 (2018): 12-18.
APA Style:Vinícius Batista Peçanha, Tiago Bittencourt Nazaré, Raissa Batista Peçanha (2018). Related Work: Framework for Evaluating Internal Controls in a Cloud Computing. International Journal of Engineering Trends and Technology, 66(1), 12-18.
Abstract
Cloud Computing has emerged as a way to save resources by sharing structures in distributed systems. This has improved flexibility and provided on-demand services. This article aims to demonstrate the scenario after the deployment of the cloud environment, focusing on existing functionalities, possible security problems that may be encountered, possible problems when SLAs are celebrated, as well as a range of cryptographic algorithms that can be worked by the provider. With the use of this framework, internal controls were deployed in cloud environments. Case studies and vulnerability analysis were performed to verify security, allowing important results to be obtained, such as: making possible the choice of Amazon AWS and services that have the desired control; create metrics for service monitoring; integrate controls on service contracts and oversee service level agreements.
Reference
[1] Vaquero, L. et al. A break in the clouds: towards a cloud definition. SIGCOMM, 2008.
[2] Ruschel, H. CloudComputing. Especialização em Redes e Segurança de Sistemas. Curitiba, PR: Pontifícia Universidade Católica do Paraná (PUC), 2010. 117p.
[3] NIST. The NIST Definition of Cloud Computing. 2011. Disponível em: https://csrc.nist.gov/publications/detail/sp/800-145/final>. AcessedOctober 11, 2018.
[4] Sousa, F. R. C.; Moreira, L. O.; Machado, J. C. CloudComputing: Conceitos, Tecnologias, Aplicações e Desafios. ERCEMAPI, Parnaíba, 2009. Disponível em: http://www.ufpi.br/subsiteFiles/ercemapi/arquivos/files/minicurso/mc7.pdf>. AcessedNovember 26, 2018.
[5] Veras, Manoel. CloudComputing: nova Arquitetura da TI. Rio de Janeiro: Brasport Livros e Multimídia Ltda., 2012. 240 p. Disponível em: https://books.google.com.br/books?id=yiggoX2aoC8C&printsec=frontcover&hl =pt-BR&source=gbs_ge_summary_r&cad=0#v=onepage&q&f; =false>. AcessedNovember 20, 2018.
[6] Martins, Rômulo. Os modelos de CloudComputing. 2013. Disponível em: https://www.qinetwork.com.br/publica-privada-comunidade-ou-hibrida-conheca-os-modelos-de-cloud-computing/>. AcessedNovember 29, 2018.
[7] Amrhein, D.; Quint, S. CloudComputing para a empresa: Parte 1: Capturando a nuvem. 2009. Disponível em: http://www.ibm.com/developerworks/br/websphere/techjournal/0904_amrhein/0904_amrhein.html>. AcessedNovember 23, 2018.
[8] Stanoyevitch, Alexander. Introduction to Cryptography with Mathematical Foundations and Computer Implementations CRC Press, California State University Carson, California, USA. 2010.
[9] Wenzel, Maira. Serviços criptográficos. 1. 2017. Disponível em: https://docs.microsoft.com/pt-br/dotnet/standard/security/cryptographic-services>. AcessedNovember 16, 2018.
[10] Stallings, William. Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice Stallings William Pearson Education, 2014.
[11] Rezende Oliveira, Ronielton. Os principais algoritmos de cifragem. Criptografia simétrica e assimétrica, Belo Horizonte - MG, v. 1, n. 1, p. 3-8, fev. 2012. Disponível em: http://www.ronielton.eti.br/publicacoes/artigorevistasegurancadigital2012.pdf>. AcessedNovember 17, 2018.
[12] COBIT, 5. COBIT Focus Volume 2: abril de 2014. 5. 2014. Disponível em: http://www.isaca.org/Knowledge-Center/cobit/cobit-focus/Pages/COBIT-Focus-Volume-2-Abril-de-2014.aspx>. AcessedOctober 15, 2018.
Keywords
Cloud Computing, Framework, Internal controls, SLA, Amazon AWS.