skip to main content
10.1145/3017971.3017985acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Comparison of Security Frameworks for Governmental Clouds between United States and European Union

Published: 26 November 2016 Publication History

Abstract

Cloud computing, as an emerging computing model, can provide users with inexpensive, convenient and large scale computing. In the recent years, both government and other organizations have begun to utilize cloud computing, such as the United States and European Union. However, deployment of clouds brings security challenges to consumers. Governmental cloud is a secure and trusted environment for government to deliver services to citizens. With the governmental use of cloud, there are many emerging risks and threats. It is important to focus on cloud security, governmental cloud in particular. United States proposed Security Reference Architecture and Challenging Security Requirements for US Government Cloud Computing Adoption and European Union proposed a security framework for governmental clouds. We introduce cloud computing, governmental cloud and risks related to use of cloud, then analyze the security frameworks of governmental cloud of United States and European Union. Finally, we make comparisons/comments on both frameworks from different perspectives.

References

[1]
Robert B. Bohn, John Messina, Fang Liu, Jin Tong, and Jian Mao. 2011. NIST Cloud Computing Reference Architecture. In Proceedings of the 2011 IEEE World Congress on Services (SERVICES '11). IEEE Computer Society, Washington, DC, USA, 594--596. DOI=http://dx.doi.org/10.1109/SERVICES.2011.105.
[2]
Peter M. Mell and Timothy Grance. 2011. SP 800--145. the NIST Definition of Cloud Computing. Technical Report. NIST, Gaithersburg, MD, United States.
[3]
ENISA(2015)."Security Framework for Govenmental Clouds". Available online at http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/governmental-cloud-security/security-framework-for-govenmental-clouds/security-framework-for-governmental-clouds/at_download/fullReport,Feb 2015.
[4]
Catteddu, D. (2010). Cloud Computing: Benefits, Risks and Recommendations for Information Security. Web Application Security. Springer Berlin Heidelberg.
[5]
Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245--253.
[6]
NIST. "NIST Cloud Computing Security Reference Architecture". Available online at http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf
[7]
Iorga, Michaela. "Challenging Security Requirements for US Government Cloud Computing Adoption." NIST (2012).

Cited By

View all
  • (2021)Social Research Methods in CybersecurityHandbook of Research on Advanced Research Methodologies for a Digital Society10.4018/978-1-7998-8473-6.ch046(840-866)Online publication date: 3-Sep-2021
  • (2018)Cloud Computing Security and PrivacyProceedings of the 3rd International Conference on Big Data and Computing10.1145/3220199.3220217(119-123)Online publication date: 28-Apr-2018
  1. Comparison of Security Frameworks for Governmental Clouds between United States and European Union

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '16: Proceedings of the 6th International Conference on Communication and Network Security
    November 2016
    133 pages
    ISBN:9781450347839
    DOI:10.1145/3017971
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 November 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. EU
    2. Governmental clouds
    3. US
    4. comparison
    5. security framework

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • CERNET Innovation Project

    Conference

    ICCNS '16

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Social Research Methods in CybersecurityHandbook of Research on Advanced Research Methodologies for a Digital Society10.4018/978-1-7998-8473-6.ch046(840-866)Online publication date: 3-Sep-2021
    • (2018)Cloud Computing Security and PrivacyProceedings of the 3rd International Conference on Big Data and Computing10.1145/3220199.3220217(119-123)Online publication date: 28-Apr-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media