Gupta, SmratiFerrarons-Llagostera, JaumeDominiak, JacekMuntés-Mulero, VictorMatthews, PeterRios, ErkudenAu, Man Ho AllenChoo, Kim-Kwang RaymondLi, Kuan-ChingCastiglione, ArcangeloPalmieri, Francesco2024-07-242024-07-242017Gupta , S , Ferrarons-Llagostera , J , Dominiak , J , Muntés-Mulero , V , Matthews , P & Rios , E 2017 , Security-centric evaluation framework for IT services . in M H A Au , K-K R Choo , K-C Li , A Castiglione & F Palmieri (eds) , Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Proceedings . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 10232 LNCS , Springer Verlag , pp. 736-747 , 12th International Conference on Green, Pervasive and Cloud Computing, GPC 2017 , Cetara , Italy , 11/05/17 . https://doi.org/10.1007/978-3-319-57186-7_53conference97833195718500302-9743https://hdl.handle.net/11556/1618Publisher Copyright: © Springer International Publishing AG 2017.Tremendous growth and adoption of cloud based services within IT enterprises has generated important requirements for security provisioning. Users need to evaluate the security characteristics of different providers and their offered services. This generates an additional requirement for methods to compare cloud service providers on the basis of their capabilities to meet security requirements. This paper proposes a novel framework to assess and compare cloud services on the basis of their security offerings, leveraging existing best practices and standards to develop new relevant metrics. We provide comparison yardsticks related to security to evaluate cloud services such that the security robustness of cloud services can be computed using easy to evaluate deconstructed metrics. This paper provides a framework that can be leveraged to provide security enhancement plans both for users and providers.12enginfo:eu-repo/semantics/restrictedAccessSecurity-centric evaluation framework for IT servicesconference output10.1007/978-3-319-57186-7_53CertificationsCloud computing best practicesSecurity controlsTheoretical Computer ScienceGeneral Computer Sciencehttp://www.scopus.com/inward/record.url?scp=85019182215&partnerID=8YFLogxK