Open Access Open Access  Restricted Access Subscription or Fee Access

Industrial View of Security in Cloud Computing

Awanish Kumar, D Revina Rebecca

Abstract


This paper presents Requirement Analysis of cloud Security in Distributed Systems, particularly looking at trust, confidentiality and privacy issues. The novelty of cloud is its ability to perform automated tasks in a way that was never envisaged. However, security and safety issues have been identified as key barriers, especially in distributed environments. Requirement Analysis of cloud Security in Distributed Systems. Cloud security is often seen as a technical problem. We argue that its solution needs both technical and management input. We find that cloud computing offers reliability and flexibility and its low cost makes it attractive, particularly to small and medium sized enterprises. We note that security technology must be adopted universally and often promptly. It requires both an organizational commitment and an individual commitment, which is most readily obtained if the technology places a low knowledge burden on users: that is, it is transparent or adds only a few, often-repeated, tasks. We note that providers have already achieved this in many cloud services. Organizations need clarity of what security is provided and who is responsible for breaches. They also need cloud providers to help them identify and recover from breaches. We consider why breaches have now become a hot topic, and provide a suggestion of how to mitigate the impact of these whilst meeting our management objectives and complying with the forthcoming EU General Data Protection Regulation.

Keywords


Security Requirements, Security Threats, Industrial Goals, Cloud Security.

Full Text:

PDF

References


J. Tidd, J. Bessant, and K. Pavitt, managing innovation. Hoboken. NJ: Wiley, 2013.

Y. Chen, V. Paxson, and R. H. Katz, “Handbook of Cloud Computing,” Handbook of Cloud Computing, vol. 20, no.2010, 2010, pp. 493–516.

P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” NIST, Tech. Rep., 2011. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf [Last accessed: November 2017]

P. Drucker, Management Challenges for the 21st Century, ser. Management Challenges for the 21st Century. HarperCollins, 1999, no. pt. 794.

G. Weir and A. Aßmuth, “Strategies for Intrusion Monitoring in Cloud Services,” Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–5.

M. Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. Que Publishing, 2008.

S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing - The business perspective,” Decision Support Systems, vol. 51, no. 1, 2011, pp. 176–189.

K. Gai and S. Li, “Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends,” 2012 Fourth International Conference on Multimedia Information Networking and Security, 2012, pp. 142–146.

S. Greengard, “Cloud computing and developing nations,” Communications of the ACM, vol. 53, no. 5, 2010, pp. 18–20.

V. Ratten, “Entrepreneurial and ethical adoption behaviour of cloud computing,” Journal of High Technology Management Research, vol. 23, no. 2, 2012, pp.155–164.

Y. Alshamaila, S. Papagiannidis, and F. Li, “Cloud computing adoption by SMEs in the north east of of England,” Journal of Enterprise Information Management, vol. 26, no. 3, 2013, pp. 250-275.

L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao, and C. Fu, “Cloud computing: A Perspective study,” New Generation Computing, vol. 28, no. 2, 2010, pp. 137–146.

D. C. Plummer, T. J. Bittman, T. Austin, D. W. Cearley, and D. M. Smith, “Cloud Computing: Defining and Describing an Emerging Phenomenon,” Gartner Research, vol. G00156220, no. June, 2008, pp. 1–9.

W. DeLone, “Determinants of Success for Computer Usage in Small Business,” MIS Quarterly, vol. 12, no. 1, 1988, pp. 51–61.

P. K. Ross and M. Blumenstein, “Cloud computing as a facilitator of SME entrepreneurship,” Technology Analysis & Strategic Management, vol. 27, no. 1, 2015, pp. 87–101.

M. Stern-Peltz and J. Armitage, “IT Firms Lose billions After NSA Scandal Exposed by Whistleblower Edward Snowden,” 2013. [Online]. Available: http://www.independent.co.uk/life-style/gadgets-and- tech/news/ it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-- edward-snowden-9028599.html [Last accessed: November 2017.

F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models Author,” Management Science, vol. 35, no. 8, 1989, pp. 982–1003.

A. Cooper, About Face: The Essentials of User Interface Design. IDG Books Worldwide, Inc., 1995.

E. M. Rogers, Diffusion of Innovations, 5th ed. New York: Free Press, 2003.

E. M. Rogers, Diffusion of Innovations, 3rd ed. London: The Free Press, 1983.

M. J. Gallivan, “Organizational adoption and assimilation of complex technological innovations,” ACM SIGMIS Database, vol. 32, no. 3, 2001, p. 51.

P. Walley and V. Amin, “Automation in a Customer Contact Environment,” International Journal of Operations & Production Management, vol. 14, no. 5, 1994, pp. 86–100.

R. G. Fichman, “Information Technology Diffusion: A Review of Empirical Research,” Proceedings of the Thirteenth International Conference on Information Systems ({ICIS} ’92), 1992, pp. 195–206.

EU, “EU General Data Protection Regulation,” 2017. [Online]. Available: http://www.eugdpr.org/[Last accessed: November 2017]

Verizon,“2012DataBreachInvestigationsReport,” Verizon,Tech.Rep., 2012.

Verizon, “2016 Verizon Data Breach Report,” Tech. Rep., 2016.

B. Duncan and M. Whittington, “Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail,” in Cloud Computing 2016: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, no. April. Rome: IEEE, 2016, pp. 125–130.

B. Duncan and M. Whittington, “Cloud cyber-security: Empowering the audit trail,” International Journal on Advances in Security, vol. 9, no. 3 & 4, 2016, pp. 169–183.

B. Duncan and M. Whittington, “Creating an Immutable Database for Secure Cloud Audit Trail and System Logging,” in Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization. Athens, Greece: IARIA, ISBN: 978-1-61208-529-6, 2017, pp. 54–59.

B. Duncan and M. Whittington, “Creating and Configuring an Immutable Database for Secure Cloud Audit Trail and System Logging,” International Journal On Advances in Security, no. 3&4, 2017.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.