Cloud Computing and Digital Preservation: A Comparison of Two Services. Amanda L. Stowell. San Jose State University
|
|
- Daisy Watson
- 7 years ago
- Views:
Transcription
1 Cloud Computing and Digital Preservation: A Comparison of Two Services Amanda L. Stowell San Jose State University Abstract This paper will discuss the obstacles and methods of digital object preservation, define the terms cloud computing and software as a service, and identify the risks associated with cloud usage. Additionally, a comparison of two digital object preservation, cloud-based services will be provided.
2 Digital Object Preservation In the archival and records information management role, it becomes necessary to preserve an object, digital or physical, sometimes for a designated period of time and sometimes for permanency. In fact, preservation is the primary responsibility of museums, libraries, and archives and safeguarding these objects of enduring value, legal, societal, and business, is of utmost priority (Cloonan, 2007). In regards to digital objects, preservation can be described as,... ensuring the authenticity, usability, and accessibility of digital objects through time as long as required or/and... ensuring technological survival of digital information or objects as long as required (Hofman, 2002, p. 1). Digital objects pose a unique challenge for archivist and records information managers. Unlike their tangible physical object counter parts, digital objects can be difficult to describe and observe. Preservation is of serious concern in the library/archival community because of the evanescence and eventual obsolescence of the hardware and software we must use to access the texts (Cloonan, 2007, p. 135). Another important factor to consider in the preservation of a digital object is the recreation of the experience as the creator intended. An informational entity that is "preserved" without being usable in a meaningful and valid way has not been meaningfully preserved, i.e., has not been preserved at all (Rothenberg, 2000a, n.p.). To explain further, a digital object cannot simply be preserved as a single entity. Rather, the environment that it was created in must also be replicated. According to Rothenberg, preserved publications should retain as much as possible of their original functionality and behavior (2000b, p. 43). In the case of digital objects, this means that the environment must be recreated. Metadata plays an important role in the preservation of objects of any kind; however in the case of digital objects, its role is crucial. Metadata, in its simplest form is data about data, but it is far more complex and without it a
3 digital object might be entirely inaccessible. It provides future users with all the necessary information they will need to open, render and interact with the preserved digital object (Doyle, 2009, p. 34). There are three primary methods of digital preservation; migration, normalization, and emulation. Migration of digital objects involves waiting until the software or hardware required to access a digital object becomes obsolete, and then transferring the files to a new software application or hardware configuration (Doyle, 2009, p. 35). Normalization, a type of migration, is the process of converting a digital object type to an open-source format type. This minimizes the risk of a file format becoming obsolete due to proprietary software or a company no longer supporting the format. Emulation is the process of recreating on current hardware the technical environment required to view and use digital objects from earlier times (p.34). It is the mimicking of a software, hardware, or operating system environment for the purpose of allowing an object to be experienced in its original state. For particular digital object types, this might be the only method of preservation currently available. Cloud Computing and Software as a Service Cloud computing and software as a service (SaaS) is ever changing and evolving as the needs of the organizational communities change, lawsuits are filed and legalities adjust, and understanding of cloud potential become more prevalent. In 2011, the National Institute of Standards and Technology (NIST) released a publication that defined cloud computing as having five Essential Characteristics; on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. NIST determined that the cloud could be deployed using one of the four models: Private cloud (limited access), community cloud (access to a select group with a common purpose), public cloud (access to all), or a hybrid cloud (a combination of the
4 aforementioned) (p. 2-3). The publication also provided a definition of SaaS the consumer [uses] the provider s application running on a cloud infrastructure which are accessed via a web browser or a program interface that is managed by the provider (p. 2). The provider is also responsible for managing the network, servers, storage, etc. Prior to the NIST publication, academic documentation, definitions, and research can be difficult to find or can vary in specifics. In fact, many publications prior to 2008 reflect uncertainty in the longevity cloud computing and struggle to define the term. While definitions can be found, the NIST publication seem to unify and set a standard for the academic fields to go forward with. One notable publication in 2010 by Armbrust et al. identified 10 Obstacles and Opportunities for Cloud Computing, provided clear definitions, and offered recommendations for the future of cloud computing and SaaS including increased scalability. Cloud Computing Risks Just as when information or records are stored in a physical location is susceptible to certain risks, so are digital objects in a cloud environment. Two of the main risks are security and privacy. These are not only concerns of the business or organization that is utilizing the cloud they are concerns of the patrons or customers. Cloud storage and computing is still a relatively unknown term outside of the information occupations and with the threat of identity and information theft, patrons and customers can be quite skeptical of their information floating in an unknown realm. Companies that offer cloud computing solutions understand these threats and have taken measures to minimize the risk. Security One of the main challenges of cloud computing is security. The most secure cloud environment would be an environment with no access. No access equals optimal security. This,
5 however, is simply not possible and completely defeats the purpose of cloud computing. The consumer requires access. In fact, an ultimate consumer cloud environment would be one of unfettered access, high-speed, high-performance, access. This is not possible either as limitless access would make security impossible and the loss of data and information would be uncontrollable. Both scenarios, ultimate security and limitless access, are not possible. This is the challenge of a cloud service provider find the balance between access and security a secure cloud provides a reliable service by protecting data and its services available to the client with high performance (Sinjilawi, Y. K., AL-Nabhan, M. Q., & Abu-Shanab, E. A., 2014, p. 193). Privacy Information and user privacy is important in cloud computing and poses one of the other main challenges of a cloud environment. When information is left exposed in the cloud, transferred, or shared it is at a risk of exposing personal or sensitive data. Sinjilawi et al. offered these possible solutions to address privacy in the cloud: Anonymity-based method data is anonymized before it transfers from the user to the cloud service. The cloud service provider has the necessary data on hand to obtain what they need from the anonymized information. Privacy preserving authorization system data is not encrypted as the service provider is trusted. The user sets parameters on access and access policies. Privacy-preserving architecture this method requires that the service provider have a key or a decoder to even read the information being sent or requested. This ensures that no party without a key would be able to decipher the data. Oruta approach original user can control their data and its flow in the cloud so; users request then wait for verification of data depending on TPA to carry out auditing. Here,
6 three algorithms: KeyGen, RingSign and RingVerify are constructed for achieving the privacy-preserving auditing (p. 197). Cloud Service Comparison This paper has briefly discussed many of the factors relating to cloud computing, environment, infrastructure, and (SaaS). This next portion will compare two vendors, their cloud services and their approaches to security and privacy in the management of digital object preservation. Digital Archive OCLC offers many products for libraries, archives and records management. For the purposes of this paper, the service Digital Archive will be discussed. Located under the digital collection management tab on their website, Digital Archive is secure, managed storage for digital preservation (OCLC, 2015). In the overview section, OCLC mentions a few key features of the software long-term storage of an organization s digital files in a purpose-built environment, specific processes are followed to ensure the files are secure over a long period of time, quality checks are performed when the data arrives at the center and are routinely checked for digital health, and works smoothly with OCLC s ContentDM software by integrating with user-defined workflows. As previously discussed, security and privacy are two of the main risks to digital objects in a cloud environment. Digital Archive takes measures to minimize these risks: Physical security the system is housed in a limited-access operations facility, monitored 24/7 by system operators, security guards and cameras. Data security processes and procedures are created and actioned. Date backups copies of all data is distributed between multiple locations.
7 Disaster recovery facilities possess a disaster plan. ISO compliant ISO 9001 certified and ISO compliant. Additionally, OCLC performs routine virus scans, manifest checks, fixity checks, and format verifications. It is not explicitly state whether or not the files are routinely migrated to a newer format version or if files are converted to an open source. Preservica Preservica offers cloud services aimed at archives, libraries, museums, and government organizations, small to large. In fact, the scalability of the software is one of the main features with the offering of three packages to fit any size organization. The website features a few videos that demonstrate the processes and services that Preservica can offer. This makes the website attractive and easy to maneuver and understand. Preservica offers many reasons the service is superior to competition. Notably, Preservica has contributed to the development of many standards in the field - including PRONOM, DROID and OAIS. Preservica addresses the concerns of privacy and security in cloud computing by using the file migration method. This ensures that a digital object, uploaded by the user, will still be accessible and fully functional in the future. A video demonstrating this fact can be found on the website under the how it works tab. Additionally, users define access rights and privileges and external users are required to authenticate before gaining access to information. Information could not be found on the website regarding ISO standards of compliance or measures taken to ensure the physical security of the digital information. Conclusion This paper provided a brief overview of the digital abject preservation, cloud computing and its risks, and then compared two such services based solely on what could be found on their
8 websites. Preservica seems to have the upper hand in notoriety as the list of organizations using the software was quite lengthy. However, it was appreciated that OCLC made it a point to list the steps that have been taken to ensure the security and integrity of the information. Both services offer the same final element preservation of the digital object, but a decision as to which would be appropriate for an individual organization would have to be made with more information. Such as, cost, longevity of the service provider s business plan, interface, and specific functions.
9 References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A.,... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), Cloonan, M. (2007). The paradox of preservation. Library Trends, 56(1), Doyle, J., Viktor, H., & Paquet, E. (2009). Long-term digital preservation: preserving authenticity and usability of 3-D data. International Journal on Digital Libraries, 10(1), doi: /s Hofman, H. (2002). Can Bits and Bytes be Authentic? Preserving the Authenticity of Digital Objects. Retrieved from Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing ( ). Retrieved from National Institute of Standards and Technology website: OCLC: Worldwide, member-driven library cooperative Global. (2015). Retrieved from Preservica: Digital preservation technology. (2015). Retrieved from Rothenberg, J. (2000a). Preserving Authentic Digital Information (92). Retrieved from Council on Library and Information Resources website: Rothenberg, J. (2000b). An experiment in using emulation to preserve digital publications. Koninklijke Bibliotheek, The Hague, The Netherlands. Retrieved from
10 Sinjilawi, Y. K., AL-Nabhan, M. Q., & Abu-Shanab, E. A. (2014). Addressing Security and Privacy Issues in Cloud Computing. Journal Of Emerging Technologies In Web Intelligence, 6(2), doi: /jetwi
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationTHE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationEnable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
More informationIndex Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,
More informationAchieving a Step Change in Digital Preservation Capability
Essential Guide Achieving a Step Change in Digital Preservation Capability An assessment of Preservica using the Digital Preservation Capability Maturity Model (DPCMM) Executive Summary Nearly every organization
More informationOCLC Digital Archive Preservation Policy and Supporting Documentation Last Revised: 8 August 2006
OCLC Digital Archive Preservation Policy and Supporting Documentation Last Revised: 8 August 2006 OCLC Online Computer Library Center, Inc. Dublin, Ohio 43017-3395 USA 2004, OCLC Online Computer Library
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationDEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,
More informationEx Libris Rosetta: A Digital Preservation System Product Description
Ex Libris Rosetta: A Digital Preservation System Product Description CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationCLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15
CLOUD IN HEALTHCARE CURRENT STATE AND STRATEGIES THAT IMPACT THE BOTTOM LINE EXECUTIVE SUMMARY As healthcare organizations struggle with competing priorities such as HITECH/ARRA, Meaningful Use, ICD-10,
More informationInformation Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
More informationDIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES
DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES Sreekala P.K., Jayasree V & Dr. M D Baby Sreekala P.K. is working as Professional Assistant at Cochin University of Science
More informationSecurity Aspects of Cloud Computing
Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationHow To Build A Map Library On A Computer Or Computer (For A Museum)
Russ Hunt OCLC Tools Managing & Preserving Digitised Map Libraries Keywords: Digital collection management; digital collection access; digital preservation; long term preservation. Summary This paper explains
More informationInteragency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
More informationInnovative Architectures For Cloud Data Centers
Innovative Architectures For Cloud Data Centers Cloud computing has ushered in a new era for data centers. Huawei offers efficient, flexible, and innovative cloud data centers and delivers extensive project
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationBUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan info@bm-support.org 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
More informationRetention & Disposition in the Cloud Do you really have control?
InterPARES Trust Retention & Disposition in the Cloud Do you really have control? Franks Patricia, San Jose State University, San Jose, USA and Alan Doyle, University of British Columbia, Canada October
More informationCloud Computing and its Security in Higher Education
Cloud Computing and its Security in Higher Education Samir Tout stout@emich.edu School of Technology Studies, Information Assurance Eastern Michigan University (EMU) William Sverdlik wsverdlik@emich.edu
More informationTERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
More information<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012
Cloud Archive Trends and Challenges PASIG Winter 2012 Raymond A. Clarke Enterprise Storage Consultant, Oracle Enterprise Solutions Group How Is PASIG Pronounced? Is it PASIG? Is it
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationcustom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
More informationCloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
More informationArchive and Preservation in the Cloud - Business Case, Challenges and Best Practices. Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP
Archive and Preservation in the Cloud - Business Case, Challenges and Best Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationEMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE
EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE INTRODUCTION IT organizations today grapple with two critical data storage challenges: the exponential growth of data and an increasing need to keep more data for
More informationin the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP
Digital PRESENTATION Data Archive TITLE and GOES Preservation HERE in the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP SNIA Legal Notice The material contained
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationVirtual Data Centre Public Cloud Simplicity Private Cloud Security
Virtual Data Centre Public Cloud Simplicity Private Cloud Security www.interoute.com Interoute Virtual Data Centre Virtual Data Centre (VDC) is Interoute s Enterprise class Infrastructure as a Service
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationCloud Archive & Long Term Preservation Challenges and Best Practices
Cloud Archive & Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe, Inc. Author: Sebastian Zangaro, HP SNIA Legal
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationE-Content Service Group Virtual Meeting. Digital Preservation: How to Get Started
E-Content Service Group Virtual Meeting Digital Preservation: How to Get Started Slide 2 of 17 Agenda Committee Members E-Content Purpose Presentation by Greg Zick Questions Discussion for May Meeting
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More informationCloud Computing--Efficiency and Security
Cloud Computing--Efficiency and Security Mick Atton, VP & Chief Architect Thomson Reuters--Legal July 22, 2013 Thomson Reuters Thomson Reuters is the leading source of intelligent information for the world's
More informationInformation Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.
Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous
More informationCloud Computing: Implications and Guidelines for Records Management in Kentucky State Government
Cloud Computing: Implications and Guidelines for Records Management in Kentucky State Government (Version 1.0 August 2012) Many information technology (IT) departments and resource allocators are considering
More informationWhy Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it
The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationAHDS Digital Preservation Glossary
AHDS Digital Preservation Glossary Final version prepared by Raivo Ruusalepp Estonian Business Archives, Ltd. January 2003 Table of Contents 1. INTRODUCTION...1 2. PROVENANCE AND FORMAT...1 3. SCOPE AND
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationTips For Buying Cloud Infrastructure
27 Tips For Buying Cloud Infrastructure A Comprehensive list of questions to ask yourself when reviewing potential cloud providers By Christopher Wilson @chrisleewilson Table of Contents Intro: Evaluating
More informationWhat We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs
What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management
More informationCLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
More informationJohn Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
More informationData Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
More informationCloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationMimecast Enterprise Information Archiving
DATASHEET Mimecast Enterprise Information Archiving A single, secure and accessible cloud archive for your business most important information. Mimecast delivers a secure, dependable and highly scalable
More informationClinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
More informationEMC PERSPECTIVE. The Cloud Controversy IT Alternative or IT Architecture?
EMC PERSPECTIVE The Cloud Controversy IT Alternative or IT Architecture? The Cloud Controversy IT Alternative or IT Architecture? Table of Contents Overview...........................................................................
More informationPerspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
More informationWhy Migrate to the Cloud. ABSS Solutions, Inc. 2014
Why Migrate to the Cloud ABSS Solutions, Inc. 2014 ASI Cloud Services Information Systems Basics Cloud Fundamentals Cloud Options Why Move to the Cloud Our Service Providers Our Process Information System
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationHow To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
More informationCLOUD COMPUTING DEMYSTIFIED
CLOUD COMPUTING DEMYSTIFIED Definitions you ve been pretending to understand JACK DANIEL, CCSK, CISSP, MVP ENTERPRISE SECURITY Definitions Words have meaning, professionals need to understand them. We
More informationLong-term archiving and preservation planning
Long-term archiving and preservation planning Workflow in digital preservation Hilde van Wijngaarden Head, Digital Preservation Department National Library of the Netherlands The Challenge: Long-term Preservation
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationProtecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
More informationCloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu 2 If cloud computing is so simple, then what s the big deal? What is the
More informationCreating the ultimate digital insurance
By Piql AS Rev. 140625 Creating the ultimate digital insurance Behind the curtains Ensuring future access Digital preservation is about ensuring future access to digital material. When long-term access
More informationADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT
ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT 2 CLOUD SOLUTION Cloud/hosted software spending by nonprofits and associations increased by 43% while technology hardware
More informationCLOUD COMPUTING CUSTOMER RELATIONSHIP MANAGEMENT FOR SMALL AND MEDIUM ENTERPRISES
CLOUD COMPUTING CUSTOMER RELATIONSHIP MANAGEMENT FOR SMALL AND MEDIUM ENTERPRISES Radosław URBAŃSKI, Krzysztof BZDYRA Summary: The aim of this paper is to present the benefits and risks to small and medium
More informationCustomer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
More informationCloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
More informationDIGITAL PRESERVATION AT THE U.S. GOVERNMENT PRINTING OFFICE: WHITE PAPER. Version 2.0. 9 July 2008 UNITED STATES GOVERNMENT PRINTING OFFICE
DIGITAL PRESERVATION AT THE U.S. GOVERNMENT PRINTING OFFICE: WHITE PAPER Version 2.0 9 July 2008 Record of Changes Version Description Of Change Revision Date Author Number 1.0 Baseline Document July 12,
More informationCloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
More informationSmarter Balanced Technology Implementation Readiness v1.1 11 July 2014
Smarter Balanced Technology Implementation Readiness v1.1 11 July 2014 Release 1.1 Note: The previous version of this document was titled, Smarter Balanced Applications Deployment and Technology Certification
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationCloud Forensic Investigation using Digital Provenance Scheme
Cloud Forensic Investigation using Digital Provenance Scheme Nay Aung Aung, and Myat Myat Min Abstract In recent year, Cloud computing has become popular as a cost-effective and efficient computing paradigm.
More informationProposal for Online Backup
Proposal for Online Backup Prepared for: Prepared by: Prepared on: Custom Proposal Prepared for Account Manager KeepItSafe 6922 Hollywood Blvd Los Angeles, CA 90028 Ph. 888 965 9988 [Prospect Name] [Company
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationPhysically present future preserved
Physically present future preserved introduction Reshaping digital preservation Ensuring future access to today s digital data is a constant challenge. As data volume grows, complexity and risk increase.
More informationCertified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
More informationitg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationHarvard Library Preparing for a Trustworthy Repository Certification of Harvard Library s DRS.
National Digital Stewardship Residency - Boston Project Summaries 2015-16 Residency Harvard Library Preparing for a Trustworthy Repository Certification of Harvard Library s DRS. Harvard Library s Digital
More informationCloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationCloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
More informationCLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
More informationNorth Carolina Digital Preservation Policy. April 2014
North Carolina Digital Preservation Policy April 2014 North Carolina Digital Preservation Policy Page 1 Executive Summary The North Carolina Digital Preservation Policy (Policy) governs the operation,
More informationPRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
More informationCloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer
Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer Plan. Prepare. Protect. About Us Formed by a Group of DC Metro
More informationCloud Computing Thunder and Lightning on Your Horizon?
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery
More informationCloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, Sabrina.segal@usitc.gov Reference
More information