A strengthening plan for enterprise information security based on cloud computing

An Na Kang, Leonard Barolli, Jong Hyuk Park, Young Sik Jeong

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users' IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.

Original languageEnglish
Pages (from-to)703-710
Number of pages8
JournalCluster Computing
Volume17
Issue number3
DOIs
StatePublished - Sep 2014

Keywords

  • Cloud computing
  • Cloud security
  • Enterprise information security
  • Security threats

Fingerprint

Dive into the research topics of 'A strengthening plan for enterprise information security based on cloud computing'. Together they form a unique fingerprint.

Cite this