Reference Hub9
Designing a Secure Cloud Architecture: The SeCA Model

Designing a Secure Cloud Architecture: The SeCA Model

Thijs Baars, Marco Spruit
Copyright: © 2012 |Volume: 6 |Issue: 1 |Pages: 19
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466612655|DOI: 10.4018/jisp.2012010102
Cite Article Cite Article

MLA

Baars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture: The SeCA Model." IJISP vol.6, no.1 2012: pp.14-32. http://doi.org/10.4018/jisp.2012010102

APA

Baars, T. & Spruit, M. (2012). Designing a Secure Cloud Architecture: The SeCA Model. International Journal of Information Security and Privacy (IJISP), 6(1), 14-32. http://doi.org/10.4018/jisp.2012010102

Chicago

Baars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture: The SeCA Model," International Journal of Information Security and Privacy (IJISP) 6, no.1: 14-32. http://doi.org/10.4018/jisp.2012010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security issues are paramount when considering adoption of any cloud technology. This article proposes the Secure Cloud Architecture (SeCA) model on the basis of data classifications which defines a properly secure cloud architecture by testing the cloud environment on eight attributes. The SeCA model is developed using a literature review and a Delphi study with seventeen experts, consisting of three rounds. The authors integrate the CI3A—an extension on the CIA-triad—to create a basic framework for testing the classification inputted. The data classification is then tested on regional, geo-spatial, delivery, deployment, governance and compliance, network, premise and encryption attributes. After this testing has been executed, a specification for a secure cloud architecture is outputted.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.