Differentiated management strategies on cloud computing data security driven by data value

被引:2
|
作者
Wang, Zhiying [1 ]
Wang, Nianxin [1 ]
Su, Xiang [1 ]
Ge, Shilun [1 ]
机构
[1] Jiangsu Univ Sci & Technol, Sch Econ & Management, Zhenjiang 212003, Peoples R China
来源
INFORMATION SECURITY JOURNAL | 2016年 / 25卷 / 4-6期
基金
美国国家科学基金会;
关键词
Cloud computing; data security; data value; differentiated management; information lifecycle management;
D O I
10.1080/19393555.2016.1231353
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security is a primary concern for the enterprise moving data to cloud. This study attempts to match the data of different values with the different security management strategies from the perspective of the enterprise user. With the help of core ideas on data value evaluation in information lifecycle management, this study extracts usage features and user features from the operating data of the enterprise information system, and applies K-means to cluster the data according to its value. A total of 39,348 records of logon log and 120 records of users from the information system of a ship-fitting manufacturer in China were collected for an empirical study. The functional modules of the manufacturer's information system are divided into five classes according to their value, which is proven reasonable by the discriminant function obtained via discriminant analysis. The differentiated data security management strategies on cloud computing are formulated for a case study with five types of data to enhance the enterprise's active cloud computing data security defense.
引用
收藏
页码:280 / 294
页数:15
相关论文
共 50 条
  • [1] Intelligent Data Management and Security in Cloud Computing
    Ogiela, Lidia
    Ogiela, Marek R.
    Ko, Hoon
    [J]. SENSORS, 2020, 20 (12) : 1 - 11
  • [2] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [3] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [4] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [5] Security Strategies of Big Data on Education Resources Based on Cloud Computing
    Zhang, Qingmiao
    Wang, Bin
    [J]. NEW INDUSTRIALIZATION AND URBANIZATION DEVELOPMENT ANNUAL CONFERENCE: THE INTERNATIONAL FORUM ON NEW INDUSTRIALIZATION DEVELOPMENT IN BIG-DATA ERA, 2015, : 123 - 127
  • [6] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [7] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [8] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    [J]. PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [9] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [10] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144