Skip to main content
Log in

A strengthening plan for enterprise information security based on cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users’ IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cloud Security Alliance: Cloud security alliance releases cloud controls matrix version 1.3, September 2012

  2. Baek, S.-J., Park, S.-M., Yang, S.-H., Song, E.-H., Jeong, Y.-S.: Efficient server virtualization using grid service infrastructure. J. Inf. Process. Syst. 6(4), 553–562 (2010)

    Google Scholar 

  3. Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing V2.1, December 2009

  4. Zhou, X., Ge, Y., Chen, X., Jing, Y., Sun, W.: A distributed cache based reliable service execution and recovery approach in MANETs. J. Converg. 3(1), 5–12 (2012)

    Google Scholar 

  5. Bandaranayake, A.U., Pandit, V., Agrawal, D.P.: Indoor link quality comparison of IEEE 802.11a channels in a multi-radio mesh network testbed. J. Inf. Process. Syst. 8(1), 1–20 (2012)

    Google Scholar 

  6. Silas, S., Ezra, K., Rajsingh, L.B.: A novel fault tolerant service selection framework for pervasive computing. Hum.-Cent. Comput. Inf. Sci. 2(5), 1–14 (2012)

    Google Scholar 

  7. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Information Security Conference (ISC) (2010)

    Google Scholar 

  8. IDC: Asia Pacific end-user cloud computing servey, September 2009

  9. Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proceedings of the 17th USENIX Security Symposium (Security) (2008)

    Google Scholar 

  10. Zhang, L.-J., Zhou, Q.: CCOA: cloud computing open architecture. In: 2009 IEEE International Conference on Web Services, pp. 607–616 (2009)

    Chapter  Google Scholar 

  11. NIST: Guide to security for full virtualization technologies. Special publication 800-125, January 2011

  12. Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: an efficient approach to collect malware. In: 9th International Symposium on Recent Advances in Intrusion Detection. Springer, Berlin (2006)

    Google Scholar 

  13. Mason, P., Kusnetzky, D.: Server Provisioning, Virtualization, and the On-demand Model of Computing: Addressing Market Confusion. IDC, June 2003

  14. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, December 2008. Elsevier, Amsterdam (2008)

    Google Scholar 

  15. Subashini, S., Kavitha, V.: A servey on security issues in service delivery models of cloud computing, January 2011

  16. Song, Z., Molina, J., Lee, S., Lee, H., Kotani, S., Masuoka, R.: Trustcube: an infrastructure that builds trust in client. in future of trust in computing. In: Proceedings of the First International Conference (2009)

    Google Scholar 

  17. https://cloud.google.com/

  18. http://www.cve.mitre.org/

  19. http://www.forrester.com/home

  20. http://www.gartner.com/technology/home.jsp

  21. http://www.ibm.com/us/en/

  22. http://www.nist.gov/index.html

Download references

Acknowledgements

This research supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2013-H0301-13-4007) supervised by the NIPA (National IT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Young-Sik Jeong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kang, A.N., Barolli, L., Park, J.H. et al. A strengthening plan for enterprise information security based on cloud computing. Cluster Comput 17, 703–710 (2014). https://doi.org/10.1007/s10586-013-0327-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-013-0327-y

Keywords

Navigation