Skip to main content
Erschienen in: Cluster Computing 3/2014

01.09.2014

A strengthening plan for enterprise information security based on cloud computing

verfasst von: An Na Kang, Leonard Barolli, Jong Hyuk Park, Young-Sik Jeong

Erschienen in: Cluster Computing | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users’ IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cloud Security Alliance: Cloud security alliance releases cloud controls matrix version 1.3, September 2012 Cloud Security Alliance: Cloud security alliance releases cloud controls matrix version 1.3, September 2012
2.
Zurück zum Zitat Baek, S.-J., Park, S.-M., Yang, S.-H., Song, E.-H., Jeong, Y.-S.: Efficient server virtualization using grid service infrastructure. J. Inf. Process. Syst. 6(4), 553–562 (2010) Baek, S.-J., Park, S.-M., Yang, S.-H., Song, E.-H., Jeong, Y.-S.: Efficient server virtualization using grid service infrastructure. J. Inf. Process. Syst. 6(4), 553–562 (2010)
3.
Zurück zum Zitat Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing V2.1, December 2009 Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing V2.1, December 2009
4.
Zurück zum Zitat Zhou, X., Ge, Y., Chen, X., Jing, Y., Sun, W.: A distributed cache based reliable service execution and recovery approach in MANETs. J. Converg. 3(1), 5–12 (2012) Zhou, X., Ge, Y., Chen, X., Jing, Y., Sun, W.: A distributed cache based reliable service execution and recovery approach in MANETs. J. Converg. 3(1), 5–12 (2012)
5.
Zurück zum Zitat Bandaranayake, A.U., Pandit, V., Agrawal, D.P.: Indoor link quality comparison of IEEE 802.11a channels in a multi-radio mesh network testbed. J. Inf. Process. Syst. 8(1), 1–20 (2012) Bandaranayake, A.U., Pandit, V., Agrawal, D.P.: Indoor link quality comparison of IEEE 802.11a channels in a multi-radio mesh network testbed. J. Inf. Process. Syst. 8(1), 1–20 (2012)
6.
Zurück zum Zitat Silas, S., Ezra, K., Rajsingh, L.B.: A novel fault tolerant service selection framework for pervasive computing. Hum.-Cent. Comput. Inf. Sci. 2(5), 1–14 (2012) Silas, S., Ezra, K., Rajsingh, L.B.: A novel fault tolerant service selection framework for pervasive computing. Hum.-Cent. Comput. Inf. Sci. 2(5), 1–14 (2012)
7.
Zurück zum Zitat Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Information Security Conference (ISC) (2010) Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Information Security Conference (ISC) (2010)
8.
Zurück zum Zitat IDC: Asia Pacific end-user cloud computing servey, September 2009 IDC: Asia Pacific end-user cloud computing servey, September 2009
9.
Zurück zum Zitat Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proceedings of the 17th USENIX Security Symposium (Security) (2008) Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proceedings of the 17th USENIX Security Symposium (Security) (2008)
10.
Zurück zum Zitat Zhang, L.-J., Zhou, Q.: CCOA: cloud computing open architecture. In: 2009 IEEE International Conference on Web Services, pp. 607–616 (2009) CrossRef Zhang, L.-J., Zhou, Q.: CCOA: cloud computing open architecture. In: 2009 IEEE International Conference on Web Services, pp. 607–616 (2009) CrossRef
11.
Zurück zum Zitat NIST: Guide to security for full virtualization technologies. Special publication 800-125, January 2011 NIST: Guide to security for full virtualization technologies. Special publication 800-125, January 2011
12.
Zurück zum Zitat Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: an efficient approach to collect malware. In: 9th International Symposium on Recent Advances in Intrusion Detection. Springer, Berlin (2006) Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: an efficient approach to collect malware. In: 9th International Symposium on Recent Advances in Intrusion Detection. Springer, Berlin (2006)
13.
Zurück zum Zitat Mason, P., Kusnetzky, D.: Server Provisioning, Virtualization, and the On-demand Model of Computing: Addressing Market Confusion. IDC, June 2003 Mason, P., Kusnetzky, D.: Server Provisioning, Virtualization, and the On-demand Model of Computing: Addressing Market Confusion. IDC, June 2003
14.
Zurück zum Zitat Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, December 2008. Elsevier, Amsterdam (2008) Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, December 2008. Elsevier, Amsterdam (2008)
15.
Zurück zum Zitat Subashini, S., Kavitha, V.: A servey on security issues in service delivery models of cloud computing, January 2011 Subashini, S., Kavitha, V.: A servey on security issues in service delivery models of cloud computing, January 2011
16.
Zurück zum Zitat Song, Z., Molina, J., Lee, S., Lee, H., Kotani, S., Masuoka, R.: Trustcube: an infrastructure that builds trust in client. in future of trust in computing. In: Proceedings of the First International Conference (2009) Song, Z., Molina, J., Lee, S., Lee, H., Kotani, S., Masuoka, R.: Trustcube: an infrastructure that builds trust in client. in future of trust in computing. In: Proceedings of the First International Conference (2009)
Metadaten
Titel
A strengthening plan for enterprise information security based on cloud computing
verfasst von
An Na Kang
Leonard Barolli
Jong Hyuk Park
Young-Sik Jeong
Publikationsdatum
01.09.2014
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2014
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-013-0327-y

Weitere Artikel der Ausgabe 3/2014

Cluster Computing 3/2014 Zur Ausgabe