IEEE/ICACT20230046 Slide.18        [Big Slide]       [YouTube] Oral Presentation
In this paper, we presented our security assessment model. The model provides a unified security policy framework based on inputs drawn from key takeaways from top threats in the cloud platform, existing cloud best practices/standards such as Cloud Security Alliance, and implementation techniques to provide an early detection mechanism using CIS Benchmarks etc. By using Blockchain technology we demonstrated how the data provenance related to security aspects is maintained uniquely in the decentralized network and in a time-stamped and tamper-evident manner based on consensus among the relevant stakeholders. We also have shown measurements of security policy compliance rate and Common Vulnerability Scoring System severity level. By looking at the security policy compliance rate and the CVSS severity level one can deduce the effectiveness of the overall system. This architecture can be used for cloud environments also.

[Go to Next Slide]
Select Voice: