Information Security of Cloud Computing for Enterprises

@article{Tsai2011InformationSO,
  title={Information Security of Cloud Computing for Enterprises},
  author={Chang-Lung Tsai and Uei-Chin Lin},
  journal={International Journal on Advances in Information Sciences and Service Sciences},
  year={2011},
  volume={3},
  pages={132-142}
}
  • Chang-Lung Tsai, Uei-Chin Lin
  • Published 28 February 2011
  • Computer Science
  • International Journal on Advances in Information Sciences and Service Sciences
Cloud computing has become one of the most significant information security issues in recent years. That is due to the dramatically emerging applications and required services of cloud computing. However, in order to safely utilize and enjoy the benefit of cloud computing through wired/wireless networking, sufficient assurance of information security such as confidentiality, authentication, nonrepudiation, and integrity is the most critical factor for adoption. In order to well understand the… 

Figures and Tables from this paper

An Efficient Security Model in Cloud Computing based on Soft computing Techniques
TLDR
An efficient security model in cloud computing environment with the help of Soft Computing Techniques is presented, which utilized genetic algorithm as the computing technique to identify the suitable nodes for transmission.
Security Model for Communication and Exchanging Data in Mobile Cloud Computing
TLDR
In this article, security challenges are defined and security model is proposed for handling realistic security holes for cloud computing that relies on applying high secure mechanism by using strong factor authentication and encryption process using ElGamal algorithm.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
TLDR
This paper discusses how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Analysis in Cloud Computing Environment
TLDR
This work mainly provides the basic idea on Cloud Computing with the Security Issue mainly faced in both larger and smaller scale organizations where Cloud Computing is implemented and necessary steps which can solve these problems to certain organisations.
Cloud computing security issues: An analysis
  • K. Gandhi, Parul Gandhi
  • Computer Science
    2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
  • 2016
TLDR
This review paper focuses on the area of cloud computing, identifying the benefits in this kind of systems and various threats related to cloud computing.
Cloud computing security requirements: A systematic review
  • Iliana Iankoulova, M. Daneva
  • Computer Science
    2012 Sixth International Conference on Research Challenges in Information Science (RCIS)
  • 2012
TLDR
The goal is to provide a comprehensive and structured overview of cloud computing security requirements and solutions and it is found that the least researched sub-areas are non-repudiation, physical protection, recovery and prosecution, and that access control, integrity and auditability are the most researched sub theareas.
Study of Mobile E-Commerce Safety System Model Based on Petri Net
TLDR
WTLS state process model and WTLS news timing diagram are designed based on WPKI, and security model of mobile E-commerce Petri net is established, indicating that no deadlocks node exist at runtime, the business processes are properly designed, accessibility is meet and a good structure and coverage is contained which brings an effective solution to the security of data transmission ofMobile Ecommerce.
Applications of Both Cloud Computing and E-government in Taiwan
TLDR
This paper takes a close look at global trend and studies global practices of egovernment projects and strategies and describes a new supplement, consumption, and delivery model for IT and ICT services based on the Internet.
Property-Based Anonymous Attestation in Trusted Cloud Computing
TLDR
An anonymous proof protocol based on property certificate is proposed and the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers is obtained.
...
...

References

SHOWING 1-10 OF 21 REFERENCES
Cloud Security Issues
TLDR
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services.
The security of cloud computing system enabled by trusted computing technology
TLDR
A model system in which cloud computing system is combined with trusted computing platform with trusted platform module is proposed, in which some important security services, including authentication, confidentiality and integrity, are provided in cloud Computing system.
Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance
TLDR
This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option and provides the detailed information on cloud computing security that has been lacking, until now.
Information Security Risk Management Framework for the Cloud Computing Environments
TLDR
The goal of this paper is to present information risk management framework for better understanding critical areas of focus in cloud computing environment, to identifying a threat and identifying vulnerability.
KvmSec: a security extension for Linux kernel virtual machines
TLDR
KvmSec can protect guest virtual machines against attacks such as viruses and kernel rootkits and be leveraged to implement a real-time monitoring and security management system.
Secure in-VM monitoring using hardware virtualization
TLDR
This paper presents Secure In-VM Monitoring (SIM), a general-purpose framework that enables security monitoring applications to be placed back in the untrusted guest VM for efficiency without sacrificing the security guarantees provided by running them outside of the VM.
Introducing New Services in Cloud Computing Environment
TLDR
This paper introduces new services in Cloud Computing environment and proposes some more fundamental services which are still undefined to the researchers in most of the cases.
Autonomic Management of Cloud Service Centers with Availability Guarantees
TLDR
This paper is to fill this literature gap devising resource allocation policies for cloud virtualized environments able to identify performance and energy trade-offs, providing a priori availability guarantees for cloud end-users.
A Study on Secure Data Storage Strategy in Cloud Computing
TLDR
A secure data storage strategy in cloud computing that splits data d into k sections using the data splitting algorithm, ensures high data security by simplifying k equation solutions, and at the same time, guarantees highly reliable data using the coefficients generated by the splitting algorithm.
Cloud computing
TLDR
The time is right for the members of the emerging cloud computing community to come together around the notion of an open cloud, and these core principles are rooted in the belief that cloud computing should be as open as all other IT technologies.
...
...