A strengthening plan for enterprise information security based on cloud computing
- Authors
- Kang, An Na; Barolli, Leonard; Park, Jong Hyuk; Jeong, Young-Sik
- Issue Date
- Sep-2014
- Publisher
- SPRINGER
- Keywords
- Cloud computing; Cloud security; Security threats; Enterprise information security
- Citation
- CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, v.17, no.3, pp 703 - 710
- Pages
- 8
- Indexed
- SCIE
SCOPUS
- Journal Title
- CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
- Volume
- 17
- Number
- 3
- Start Page
- 703
- End Page
- 710
- URI
- https://scholarworks.dongguk.edu/handle/sw.dongguk/18264
- DOI
- 10.1007/s10586-013-0327-y
- ISSN
- 1386-7857
1573-7543
- Abstract
- Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users' IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.