Abstract
Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users’ IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.
Similar content being viewed by others
References
Cloud Security Alliance: Cloud security alliance releases cloud controls matrix version 1.3, September 2012
Baek, S.-J., Park, S.-M., Yang, S.-H., Song, E.-H., Jeong, Y.-S.: Efficient server virtualization using grid service infrastructure. J. Inf. Process. Syst. 6(4), 553–562 (2010)
Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing V2.1, December 2009
Zhou, X., Ge, Y., Chen, X., Jing, Y., Sun, W.: A distributed cache based reliable service execution and recovery approach in MANETs. J. Converg. 3(1), 5–12 (2012)
Bandaranayake, A.U., Pandit, V., Agrawal, D.P.: Indoor link quality comparison of IEEE 802.11a channels in a multi-radio mesh network testbed. J. Inf. Process. Syst. 8(1), 1–20 (2012)
Silas, S., Ezra, K., Rajsingh, L.B.: A novel fault tolerant service selection framework for pervasive computing. Hum.-Cent. Comput. Inf. Sci. 2(5), 1–14 (2012)
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Information Security Conference (ISC) (2010)
IDC: Asia Pacific end-user cloud computing servey, September 2009
Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proceedings of the 17th USENIX Security Symposium (Security) (2008)
Zhang, L.-J., Zhou, Q.: CCOA: cloud computing open architecture. In: 2009 IEEE International Conference on Web Services, pp. 607–616 (2009)
NIST: Guide to security for full virtualization technologies. Special publication 800-125, January 2011
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: an efficient approach to collect malware. In: 9th International Symposium on Recent Advances in Intrusion Detection. Springer, Berlin (2006)
Mason, P., Kusnetzky, D.: Server Provisioning, Virtualization, and the On-demand Model of Computing: Addressing Market Confusion. IDC, June 2003
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, December 2008. Elsevier, Amsterdam (2008)
Subashini, S., Kavitha, V.: A servey on security issues in service delivery models of cloud computing, January 2011
Song, Z., Molina, J., Lee, S., Lee, H., Kotani, S., Masuoka, R.: Trustcube: an infrastructure that builds trust in client. in future of trust in computing. In: Proceedings of the First International Conference (2009)
Acknowledgements
This research supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2013-H0301-13-4007) supervised by the NIPA (National IT Industry Promotion Agency).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kang, A.N., Barolli, L., Park, J.H. et al. A strengthening plan for enterprise information security based on cloud computing. Cluster Comput 17, 703–710 (2014). https://doi.org/10.1007/s10586-013-0327-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-013-0327-y