Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)
Full Length Article

Journal of Cybersecurity and Information Management

Volume 11 , Issue 1 , PP: 22-29, 2023 | Cite this article as | XML | Html | PDF

Information Security Management Framework for Cloud Computing Environments

Manal M. Nasir 1 * , Salim M. Hebrisha 2

  • 1 Gwinnett Technical College (GTC), Lawrenceville , GA, 30043, USA - (Mnasir@gwinnetttech.edu)
  • 2 Libyan Iron and Steel Company (LISCO), Misrata, Libya - (salimhibrisha@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.110102

    Received: October 18, 2022 Revised: December 21, 2022 Accepted: January 06, 2023
    Abstract

    Cloud computing has become a popular paradigm for delivering computing resources and services over the internet. However, the adoption of cloud computing also brings new security challenges and risks, including data breaches, insider attacks, and unauthorized access. Therefore, it is critical to have a comprehensive information security management framework to address these challenges and ensure the security and privacy of cloud computing environments. This paper proposes a machine learning (ML) based information security management (ISM) framework for cloud computing environments that integrates best practices and standards from various domains, including cloud computing, information security, and risk management. The proposed framework includes residual recurrent network to effectively discriminate different patterns of cloud security attacks. The proposed framework emphasizes the importance of threat detection, security controls, and continuous monitoring and improvement. The framework is designed to be flexible and scalable, allowing organizations to tailor it to their specific needs and requirements.

    Keywords :

    Information Security , Information Management , Cloud Computing , Machine Learning

    References

    [1] Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A comprehensive survey on security in cloud computing. Procedia Computer Science, 110, 465-472.

    [2] Mahboob, T., Zahid, M., & Ahmad, G. (2016, August). Adopting information security techniques for cloud computing—a survey. In 2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (pp. 7-11). IEEE.

    [3] Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology, 58, 44-57.

    [4] Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.

    [5] Song, H. H. (2020). Testing and evaluation system for cloud computing information security products. Procedia Computer Science, 166, 84-87.

    [6] Chenthara, S., Ahmed, K., Wang, H., & Whittaker, F. (2019). Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE access, 7, 74361-74382.

    [7] Tariq, M. I. (2019). Agent based information security framework for hybrid cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(1), 406-434.

    [8] Ding, L., Wang, Z., Wang, X., & Wu, D. (2020). Security information transmission algorithms for IoT based on cloud computing. Computer Communications, 155, 32-39.

    [9] Sun, X. (2018, May). Critical security issues in cloud computing: a survey. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High

    Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 216-221). IEEE.

    [10] Hussein, N. H., & Khalid, A. (2016). A survey of cloud computing security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), 52.

    [11] Alsharif, M., & Rawat, D. B. (2021). Study of machine learning for cloud assisted iot security as a service. Sensors, 21(4), 1034.

    [12] Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

    [13] Alhenaki, L., Alwatban, A., Alamri, B., & Alarifi, N. (2019, May). A survey on the security of cloud computing. In 2019 2nd international conference on computer applications & information security (ICCAIS) (pp. 1-7). IEEE.

    [14] Puthal, D., Sahoo, B. P., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In 2015 International Conference on Computational Intelligence and Networks (pp. 116-123). IEEE.

    [15] Jakimoski, K. (2016). Security techniques for data protection in cloud computing. International Journal of Grid and Distributed Computing, 9(1), 49-56.

    [16] Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.

    [17] Singh, A., & Malhotra, M. (2015). Security concerns at various levels of cloud computing paradigm: A review. International journal of computer networks and applications, 2(2), 41-45.

    [18] Aljumah, A., & Ahanger, T. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET Communications, 14(7), 1185-1191.

    [19] Tsaregorodtsev, A. V., Kravets, O. J., Choporov, O. N., & Zelenina, A. N. (2018). INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE. International Journal on Information Technologies & Security, 10(4).

    [20] Markandey, A., Dhamdhere, P., & Gajmal, Y. (2018, September). Data access security in cloud computing: A review. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 633-636). IEEE.

    [21] Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2015, November). An investigation on cyber security threats and security models. In 2015 IEEE 2nd international conference on cyber security and cloud computing (pp. 307-311). IEEE.

    [22] Zaslavskaya, O. Y., Zaslavskiy, A. A., Bolnokin, V. E., & Kravets, O. J. (2018). Features of Ensuring Information Security when Using Cloud Technologies in Educational Institutions. International Journal on Information Technologies & Security, 10(3).

    [23] Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.

    [24] Vacca, J. R. (Ed.). (2016). Cloud computing security: foundations and challenges. CRC press.

    [25] Jouini, M., & Rabai, L. B. A. (2016). Comparative study of information security risk assessment models for cloud computing systems. Procedia Computer Science, 83, 1084-1089.

    [26] Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces, 38, 72-77.

    [27] Amin, Z., Singh, H., & Sethi, N. (2015). Review on fault tolerance techniques in cloud computing. International Journal of Computer Applications, 116(18), 11-17.

    [28] Abdullah Ali Salamai, Evaluation and Selection of Cloud Service: A neutrosophic model, Neutrosophic and Information Fusion, Vol. 1 , No. 2 , (2023) : 16-25 (Doi : https://doi.org/10.54216/NIF.010202)

    [29] Rahman, A. U., Khan, F. G., & Jadoon, W. (2016). Energy efficiency techniques in cloud computing. International Journal of Computer Science and Information Security (IJCSIS), 14(6).

    Cite This Article As :
    Manal M. Nasir , Salim M. Hebrisha. "Information Security Management Framework for Cloud Computing Environments." Full Length Article, Vol. 11, No. 1, 2023 ,PP. 22-29 (Doi   :  https://doi.org/10.54216/JCIM.110102)
    Manal M. Nasir , Salim M. Hebrisha. (2023). Information Security Management Framework for Cloud Computing Environments. Journal of , 11 ( 1 ), 22-29 (Doi   :  https://doi.org/10.54216/JCIM.110102)
    Manal M. Nasir , Salim M. Hebrisha. "Information Security Management Framework for Cloud Computing Environments." Journal of , 11 no. 1 (2023): 22-29 (Doi   :  https://doi.org/10.54216/JCIM.110102)
    Manal M. Nasir , Salim M. Hebrisha. (2023). Information Security Management Framework for Cloud Computing Environments. Journal of , 11 ( 1 ), 22-29 (Doi   :  https://doi.org/10.54216/JCIM.110102)
    Manal M. Nasir , Salim M. Hebrisha. Information Security Management Framework for Cloud Computing Environments. Journal of , (2023); 11 ( 1 ): 22-29 (Doi   :  https://doi.org/10.54216/JCIM.110102)
    Manal M. Nasir, Salim M. Hebrisha, Information Security Management Framework for Cloud Computing Environments, Journal of , Vol. 11 , No. 1 , (2023) : 22-29 (Doi   :  https://doi.org/10.54216/JCIM.110102)