Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Industrial View of Security in Cloud Computing


     

   Subscribe/Renew Journal


This paper presents Requirement Analysis of cloud Security in Distributed Systems, particularly looking at trust, confidentiality and privacy issues. The novelty of cloud is its ability to perform automated tasks in a way that was never envisaged. However, security and safety issues have been identified as key barriers, especially in distributed environments. Requirement Analysis of cloud Security in Distributed Systems. Cloud security is often seen as a technical problem. We argue that its solution needs both technical and management input. We find that cloud computing offers reliability and flexibility and its low cost makes it attractive, particularly to small and medium sized enterprises. We note that security technology must be adopted universally and often promptly. It requires both an organizational commitment and an individual commitment, which is most readily obtained if the technology places a low knowledge burden on users: that is, it is transparent or adds only a few, often-repeated, tasks. We note that providers have already achieved this in many cloud services. Organizations need clarity of what security is provided and who is responsible for breaches. They also need cloud providers to help them identify and recover from breaches. We consider why breaches have now become a hot topic, and provide a suggestion of how to mitigate the impact of these whilst meeting our management objectives and complying with the forthcoming EU General Data Protection Regulation.

Keywords

Security Requirements, Security Threats, Industrial Goals, Cloud Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 175

PDF Views: 0




  • Industrial View of Security in Cloud Computing

Abstract Views: 175  |  PDF Views: 0

Authors

Abstract


This paper presents Requirement Analysis of cloud Security in Distributed Systems, particularly looking at trust, confidentiality and privacy issues. The novelty of cloud is its ability to perform automated tasks in a way that was never envisaged. However, security and safety issues have been identified as key barriers, especially in distributed environments. Requirement Analysis of cloud Security in Distributed Systems. Cloud security is often seen as a technical problem. We argue that its solution needs both technical and management input. We find that cloud computing offers reliability and flexibility and its low cost makes it attractive, particularly to small and medium sized enterprises. We note that security technology must be adopted universally and often promptly. It requires both an organizational commitment and an individual commitment, which is most readily obtained if the technology places a low knowledge burden on users: that is, it is transparent or adds only a few, often-repeated, tasks. We note that providers have already achieved this in many cloud services. Organizations need clarity of what security is provided and who is responsible for breaches. They also need cloud providers to help them identify and recover from breaches. We consider why breaches have now become a hot topic, and provide a suggestion of how to mitigate the impact of these whilst meeting our management objectives and complying with the forthcoming EU General Data Protection Regulation.

Keywords


Security Requirements, Security Threats, Industrial Goals, Cloud Security.