A strengthening plan for enterprise information security based on cloud computing

Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users’ IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.

[1]  Elijah Blessing Rajsingh,et al.  A novel fault tolerant service selection framework for pervasive computing , 2012, Human-centric Computing and Information Sciences.

[2]  S. Kotani,et al.  TrustCube: An Infrastructure that Builds Trust in Client , 2009 .

[3]  Farnam Jahanian,et al.  CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.

[4]  Weiwei Sun,et al.  A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETs , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[5]  Felix C. Freiling,et al.  The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.

[6]  Liang-Jie Zhang,et al.  CCOA: Cloud Computing Open Architecture , 2009, 2009 IEEE International Conference on Web Services.

[7]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[8]  Teruhiko Teraoka,et al.  Organization and exploration of heterogeneous personal data collected in daily life , 2012, Human-centric Computing and Information Sciences.

[9]  Dharma P. Agrawal,et al.  Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-radio Mesh Network Testbed , 2012, J. Inf. Process. Syst..

[10]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[11]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[12]  Young-Sik Jeong,et al.  Efficient Server Virtualization using Grid Service Infrastructure , 2010, J. Inf. Process. Syst..