Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud

被引:0
|
作者
Katsuno, Yasuharu [1 ]
Kundu, Ashish [2 ]
Das, Koushik K. [3 ]
Takahashi, Hitomi [1 ]
Schloss, Robert [2 ]
Dey, Prasenjit [4 ]
Mohania, Mukesh [5 ]
机构
[1] IBM Res Tokyo, Tokyo, Japan
[2] IBM Res Thomas J Watson Res Ctr, New York, NY USA
[3] Capital One Enterprise Data Serv, New York, NY USA
[4] IBM Res India, New Delhi, India
[5] IBM Res Australia, Melbourne, Vic, Australia
来源
PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) | 2016年
关键词
ISSUES;
D O I
10.1109/CLOUD.2016.53
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A public cloud platform offers economy of scale, ease of management, and elasticity to solutions. In addition, regulatory compliance and security must be assured for solutions handling sensitive data, such as student and healthcare data. With the steep rise in data breaches at large enterprises, it is a requirement to emphasize the security, privacy, and compliance of cloud-delivered solutions that hold personally identifiable information (PII). An example of a solution in need of such assurances is an education and learning-related analytics service that handles confidential student data on a public cloud platform. In this paper, we propose an approach for managing the security and privacy of an education and learning-analytics solution on a public cloud platform while assuring compliance with the Family Educational Rights and Privacy Act (FERPA). We also propose a new agile deployment approach that is both rapid and automatic. A prototype of a learning-analytics solution was implemented on a SoftLayer public cloud, and the new deployment method was evaluated in comparison with existing methods.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 31 条
  • [21] Security Solutions in Cloud-based Healthcare Information Systems: A Systematic Review
    Tabatabaei, Mohsen S.
    Langarizadeh, Mostafa
    Akbari, Mohammad K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (09): : 57 - 64
  • [22] Ensuring the information security of personal data when submitting electronic appeals to the public authorities
    Polyakova, E. N.
    Filonova, O. I.
    Prokofyev, K. G.
    Sutyagin, S. A.
    XII INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE APPLIED MECHANICS AND SYSTEMS DYNAMICS, 2019, 1210
  • [23] Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation
    Brooks, Ricardo R. R.
    Williams, Kevin J. J.
    Lee, So-Yun
    JOURNAL OF BUSINESS AND PSYCHOLOGY, 2024, 39 (03) : 657 - 677
  • [24] Architectural Considerations for Addressing Federal Information Security Objectives in Public Cloud Computing Environments
    Melo, Walt
    13TH IEEE INTERNATIONAL CONFERENCE ON COMMERCE AND ENTERPRISE COMPUTING (CEC 2011), 2011, : 256 - 259
  • [25] Promoting Public Compliance through Information Disclosure: Effect of Disclosing Confirmed Cases' Personal Information on Public Mobility During the COVID-19 Outbreak
    Wei, Jiuchang
    Yang, Song
    Jiang, Hemin
    ADMINISTRATION & SOCIETY, 2024, 56 (02) : 172 - 202
  • [26] A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance
    Beckers K.
    Côté I.
    Faßbender S.
    Heisel M.
    Hofbauer S.
    Requirements Engineering, 2013, 18 (4) : 343 - 395
  • [27] Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa
    Murire, Obrain T.
    Flowerday, Stephen
    Strydom, Kariena
    Fourie, Christoffel J. S.
    TD-THE JOURNAL FOR TRANSDISCIPLINARY RESEARCH IN SOUTHERN AFRICA, 2021, 17 (01)
  • [28] Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
    Man, Zhenlong
    Liu, Jianmeng
    Zhang, Fan
    Meng, Xiangfu
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 113 : 169 - 180
  • [29] The Public Sector Cloud Service Procurement in Sweden: An Exploratory Study of Use and Information Security Challenges
    Islam, M. Sirajul
    Karlsson, Fredrik
    INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION IN THE DIGITAL AGE, 2021, 8 (01)
  • [30] From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance
    Diamantopoulou, Vasiliki
    Tsohou, Aggeliki
    Karyda, Maria
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 238 - 257