7 Conclusion
We present the Cloud security presented by CCAF from its system design, develop-
ment and implementation. We illustrate the required attributes and explain its signifi-
cance for CCAF, including the security design. To demonstrate how CCAF works,
software schema is developed. CCAF can perform quarantine and protective actions
based on “Rescue”, a XML-based schema and feature. The CCAF implementations
have been illustrated to show how to enforce security and ensure all users are protect-
ed. It provides three layers of security in Access control and firewalls; Intrusion De-
tection Systems (IDS) and Prevention System; and Isolation Management to optimize
Cloud security. CCAF security offers a framework to serve the Cloud community.
The key characteristics have been explained. Organizations that are involved in the
development and adoption of CCAF have been presented. We will develop more
service updates and demonstrations for our forthcoming projects to ensure that CCAF
security can provide more use cases and added value for the Cloud community.
References
1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G.,
Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. (2010), Above the Clouds: A Berkeley
View of Cloud computing. Communications of the ACM, 53(4), 50-58.
2. Caminao Project, Caminao’s Way: Do systems know how symbolic they are? Modelling
Systems Engineering Project, http://caminao.wordpress.com/overview/
?goback=%2Egde_3731775_member_251475288, accessed on 21st June, (2013).
3. Chang, V., Walters, R. J., & Wills, G., Cloud Storage and Bioinformatics in a private cloud
deployment: Lessons for Data Intensive research, Springer: CLOSER 2012, CCIS 367, pp.
245–264, (2013).
4. Chang, V., Business Intelligence as Service in the Cloud, Future Generation Computer
Systems, (2014).
5. Chang, V., Walters, R. J., & Wills, G., The development that leads to the Cloud Computing
Business Framework. International Journal of Information Management, 33(3), pp 524-538,
June, (2013).
6. Chang, V., Brain Segmentation – A Case study of Biomedical Cloud Computing for Edu-
cation and Research. In, Learning Technologies Workshop, Higher Education Academy
(HEA), University of Greenwich, (2013).
7. Marston, S., Li, Z., Bandyopadhyay, S. and Zhang, J. and Ghalsasi, A., Cloud computing –
The business perspective, Decision Support Systems, Elsevier, 51(1): pp 176-189, (2011).
8. Mead, N.R., et. al., Security Quality Requirements Engineering (SQUARE) Methodology,
TECHNICAL REPORT, CMU/SEI-2005-TR-009, (2005).
9. Ramachandran, M., Software components for cloud computing architectures and applica-
tions, Springer, Mahmmood, Z and Hill, R (eds.), (2011).
10. Ramachandran, M., Software Security Engineering: Design and Applications, Nova Sci-
ence Publishers, New York, USA, 2011.ISBN: 978-1-61470-128-6, (2011).
11. Tondel, I. A et al., Security requirements for rest of us: a survey, IEEE Software, Special
Issue on Security and Agile requirement engineer-ing methods, Jan/Feb. (2008).
12. Vouk, M. A., Cloud Computing – Issues, Research and Implementations, Journal of Com-
puting and Information Technology - CIT 16, page 235–246, Volume 4, (2008).
70