A Cloud Security RiskManagement Strategy

被引:7
|
作者
Choo, Kim-Kwang Raymond [1 ]
机构
[1] Univ South Australia, Sch Informa Technol & Math Sci, Adelaide, SA, Australia
来源
IEEE CLOUD COMPUTING | 2014年 / 1卷 / 02期
关键词
cloud; law; risk management; security;
D O I
10.1109/MCC.2014.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given the threat of security breaches, to both cloud service providers and organizational cloud service users, cloud security and privacy are growing public policy concerns as well a salient area of inquiry for researchers. To ensure organizational competitiveness, cloud service providers and organizational cloud service users must make detailed preparations to act against cyberthreats before they occur, and to recover from malicious cyberactivities when such threats succeed. A cloud security risk-management strategy should be a dynamic document that's regularly reviewed by stakeholders, and should include policies and objectives that align with the organization's needs. © 2014 IEEE.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [1] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [2] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [3] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [4] SOA Security Strategy Based on Cloud Immune Protection
    Chen, Hui
    2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021), 2021, : 514 - 517
  • [5] The Strategy of Cryptography for the Proposed Model of Security in Cloud Computing
    Hyseni, Dhurate
    Selimi, Besnik
    Luma, Artan
    Cico, Betim
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 24 - 28
  • [6] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [7] Research on Cloud Storage and Security Strategy of Digital Archives
    Zhang, Hua-li
    Yang, Fan
    Yang, Hua-yong
    Jiang, Wei
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2018, PT III, 2018, 10956 : 575 - 584
  • [8] A Comparative Study of National Cloud Security Strategy and Governance
    Choi, Ga-Yeong
    Seo, Jeongeun
    Kwon, Hun-Yeong
    PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2024, 2024, : 241 - 250
  • [9] A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud
    Compastie, Maxime
    Badonnel, Remi
    Festor, Olivier
    He, Ruan
    Kassi-Lahlou, Mohamed
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 464 - 467
  • [10] Security Strategy of Campus Network Data Center in Cloud Environment
    Ge Suhui
    Wan Quan
    Sun Wenhui
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 290 - 297