Review Article Proposal for a Security Management in Cloud Computing for Health Care
|
|
|
- Cynthia Stevens
- 10 years ago
- Views:
Transcription
1 e Scientific World Journal, Article ID , 7 pages Review Article Proposal for a Security Management in Cloud Computing for Health Care Knut Haufe, Srdan Dzombeta, and Knud Brandis Persicon Corporation, Friedrichstraße 100, Berlin, Germany Correspondence should be addressed to Knut Haufe; [email protected] Received 16 December 2013; Accepted 5 January 2014; Published 19 February 2014 Academic Editors: R. Colomo-Palacios, M. Niedermayer, and V. Stantchev Copyright 2014 Knut Haufe et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the ed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security es regarding cloud computing in the health care sector. Starting with a framework of general information security management es derived from standards of the ISO family the most important information security es for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information ed. The identified es will help a health care organization using cloud computing to focus on the most important ISMS es and establish and operate them at an appropriate level of maturity considering limited resources. 1. Introduction A fundamental step for the success of tapping health care into the cloud is the in-depth understanding and the effective enforcement of security and privacy in cloud computing [1]. Despite the potential gains achieved from the cloud computing of e-health services, the information security is still questionable and the security problem becomes more complicated under the cloud model [2]. Cloud computing as actually one of the most popular themes of information computing is still at the wish list of many organizations [3] and one of the most important current research topics [4]. Cloud computing environments provide a great opportunity to provide e-health services in different scenarios in an effective and simple way [5]. One of the most important health care changes over the past couple of decades was the growing interest in health information privacy. Security and protecting the privacy and security of health information are a continuous [6]. Particularlythesecurityofhealthinformationisacritical responsibility of every health care organization[7]. Given that from a security perspective necessary es and measures need to be planned and implemented. Thisisespeciallyimportantwhileoutsourcinginformation computing services in a cloud to assure an appropriate level of information security. Actually a specific framework for security management in cloud computing for health care does not exist. To address this open research question, in this paper we propose a framework for security management in cloud-based scenarios. The rest of this work is structured as follows: in Section 2 we assess the current state of the art in the area, while Section 3 gives an overview of the framework. Section 4 presents results from the evaluation of the framework, while Section5 summarizes the main findings and gives an overview of future research activities. 2. State of the Art 2.1. Cloud Computing. Cloud computing in its various modelscanbeunderstoodasaformofthewell-knownoutsourcing of information computing services [8]. In the last years, cloud computing is evolved from a marketing hype to a serious alternative to classical information computing [9] or even a long-held dream of computing as a utility [4, 10]. Some are already considering cloud computing asaparadigmchangeininformationcomputing[3, 11].
2 2 The Scientific World Journal Nonetheless, using cloud services is an important strategic decision [12]. Basic elements of cloud computing are the delivering of scalable computing services as a combination of hardand software in a virtual environment with a usage-bound payment [13]. Additionally the shared usage of computing resources by more than one customer is a basic element of cloud computing [14]. Cloud systems have shifted traditional on-premise software products towards new and service oriented solutions [4]. While different definitions of cloud computing exist, the US National Institute of Standards and Technology [14] categorized cloud computing service models as follows: (i) Infrastructure as a Service (IaaS), (ii) Platform as a Service (PaaS), (iii) Software as a Service (SaaS), and cloud computing deployment models as follows: (i) private, (ii) community, (iii) public, (iv) hybrid. Regarding [10]newincloudcomputingare (i) the illusion of infinite computing resources available on demand, (ii) the elimination of an upfront commitment by Cloud users, (iii) the ability to pay for use of computing resources on a short-term basis as needed. Of specific relevance are works in the area of the governance of cloud computing offerings; see [15] for an overview Security Management. In the last years, the continuous increasing dependency of nearly all organizations on appropriate secure information ing was stated practically, in relevant standards and frameworks as well as in the literature, for example [16, 17]and[18, page 5]. Standards for the management of information security and collections of best practice measures were developed and established [18 21]. Important standards for the development and operation of an information security management system (hereinafter referred to as ISMS ) are the ISO 270xx as well as the standards of the German Federal Office for Information Security (hereinafter referred to as BSI ) and the IT Grundschutz catalogues of the BSI in the Germanspeaking countries. Core principle of each ISMS standard is the well-known plan-do-check-act cycle [18, 19] which is used to structure ISMS es Security Management in Cloud Computing. Security, in particular, is one of the most argued-about issues in the cloud computing field and the cornerstone of cloud adoption [4]; several enterprises look at cloud computing warily due to projected security risks [22] and security issues have prevented businesses from fully accepting cloud platforms [4]. Research regarding the integration of security in cloud computing is still necessary [23]. Managing security across an enterpriseis one of the many business problems that organizations must solve in order to accomplish their missions. An organization s security strategy and goals must be framed in the context of risk [24]. So the specific risks according to cloud computing need to be assessed and treated in the risk management. Specific security and privacy risks regarding cloud computing, respectively, arise from the following: (i) authentication and access control [25] includephys- ical access issues as well as identity and credential management [4], (ii) shared usage of computing resources (except private clouds if managed by the organization itself) data in the cloud typically resides in a shared environment, but the data owner should have full control over who has the right to use the data and what they are allowed to do with it once they gain access [25], (iii) virtualization has become an indispensable ingredient for almost every cloud [26] and comes with several risks [27], (iv) outsourced and distributed computing (except private clouds if managed by the organization itself) depending on the IT outsourcing risk appropriate risk treatment measures need to be developed [28], (v) mobile access/access via internet it is popular to access the cloud storage by mobile devices; this application suffers data security risk, especially the data leakage and privacy violation problem [4, 29], (vi) flexible and rapidly changeable services and service providers the old advice never touch a running system cannot be followed anymore in cloud environments built with the intention to enable fast change [30]. In the health care sector, the general cloud computing risks are concretized as the following [31]. (i) Availability: as most of the health care providers would be using e-health cloud services, so to work continuously and effectively, services and data should be available all the time without performance degradation. (ii) Reliability: using cloud computing for such a sensitive field requires reliability for the provided services. (iii) Data management: a good database management is required for handling such diversified data. (iv) Scalability: e-health cloud would be having hundreds of health care providers with millions of patients. (v) Flexibility: different health care providers might be having different requirements. (vi) Interoperability: as there are multiple cloud service providers, services of e-health cloud for a client could
3 The Scientific World Journal 3 be provided by different service providers; therefore theyallshouldworkonsameframework. (vii) Security: as many service providers could provide the e-health cloud services, and it would be used by many health care providers, therefore their security risk would be very high. When a single health care provider is using its own IT infrastructure then it will not be problem of security as it could monitor its network effectively but on a shared network various authentication methods and access controls would be required. (viii) Privacy: amongst all the issues of e-health cloud, the most important one is privacy. (ix) Organizational change: if e-health cloud is used in a health care organization, then many changes would be done like new policies, procedures, and workflows as well changes in the of how documentation is done. (x)dataownership:inhealthcaresectorstillthereisno clear guideline for ownership of patient s record. (xi) Privacy, trust, and liability issues: as cloud is on Internet, there is a risk of data leakage, private data exposure, and data loss which could result in loss of reputation of health care provider as well as patient s trust. (xii) Usability and end users experiences: e-health cloud success lies in the fact that it is adopted by patients, health care professionals, management, and insurance companies. Those risks and their consequences need to be analyzed in depth and considered while planning for the usage of cloud services for health care, defining necessary security measures, and using cloud services. For this a detailed individual risk assessment needs to be performed [12]. 3. The Framework Organizations need to identify and manage many activities in order to function effectively and efficiently. Any activity using resources needs to be managed to enable the transformation of inputs into outputs using a set of interrelated or interacting activities this is also known as a [32, page8].in other words, a is a set of interrelated or interacting activities which transforms inputs into outputs [33]. This section describes the proposed framework designed to guide information security efforts in general as well as an identification of core ISMS es for cloud computing in health care General Framework. The initial and most high-level regarding ISMS is described in ISO as an ISMS planning [34,page2]: (i) obtaining management approval for initiating an ISMS, (ii) defining ISMS scope and ISMS policy, (iii) conducting organization analysis, (iv) conducting risk assessment and risk treatment planning, (v) designing the ISMS. According to ISO 27000/27001, ISMS es, which need to be designed, are (i) information security risk assessment [19, page 3] which is an overall of risk analysis and risk evaluation [32,page5], (ii) information security risk treatment [19,page4] which is a to select and implement measures to modify risk [32, page 5]; controls are now determinedduringtheofrisktreatment,rather than being selected from Annex A of ISO [35, page 4], (iii) resource management, which ensures that necessary resources are determined and provided [19, page 5], (iv) es to assure necessary awareness and competence [19,page5],wheretheofcreatingawareness may be regarded as a form of communication [35, page 12], (v) communication es [19, page 6], including internal and external communication as well as marketing for the ISMS, (vi) documentation control [19,pages6,7], (vii) requirements management [19,page7], (viii) change management [19,page7], (ix) to control outsourced es [19, page7], (x) performance evaluation [19, pages7, 8], containing monitoring (the performance of ISMS needs to be monitored in terms of verification and reporting of security control implementation), measurement (a measurement system used to evaluate performance in information security management and feedback suggestions for improvement needs to be established [32, page 11]), analysis, and evaluation, (xi) internal audit in terms of planning and conductinginternalauditsaspartofanauditprogram[19, page 8], (xii) management review [19,page8], (xiii) improvement [19,page9], (xiv) information security incident management [32, page 11]. Figure 1 shows the ISMS es and the interaction at a high-level basis. The begins with a requirements management which provides relevant requirements as an input for the information security risk assessment. Another which provides continuously input for the assessment of risks is the information security incident
4 4 The Scientific World Journal Initial ISMS planning Obtaining management approval for initiating an ISMS Defining ISMS scope and ISMS policy Conducting organization analysis Conducting risk assessment and risk treatment planning Designing the ISMS ISMS operation es Resource management Requirements management Results of changes Initiating changes Management review and improvement Applicable requirements Information security Evaluated risk assessment risks Incidents Information security incident management Information security risk treatment Risk treatment plan, controls, and control objectives Processes to assure necessary awareness and competence Content Risk treatment plan, controls, and control objectives Change management Internal audit Process to control outsourced es Results of changes Audit results Status of outsourced es Communication Performance evaluation Monitoring and measurement results Documentation control (documentation of output of the es) Figure 1: ISMS framework. management. Results of the risk assessment are evaluated risks which are needed in the risk treatment. Results of the risk treatment are a risk treatment plan, controls, and control objectives. Those results areusedinvariousesto (i) assure an appropriate awareness and competence using appropriate communication, (ii) regularly check the appropriateness of the chosen controls and control objectives in the internal audit, (iii) control outsourced es, (iv) evaluate the performance of the controls and the ISMS in general. Another core in which the risk treatment plan, controls, and control objectives are used as an input is the change management. The change management also delivers results of changes to the risk assessment to include them in the assessment of risks. Results of changes, internal audits, the status of outsourced es, and monitoring and evaluation results are reviewed within the management review and improvement which initiates changes. Supporting es are the resource management and the documentation control Health Care Framework. While managing information security of health care organizations which are using cloud computing needs to consider more beside the core es risk assessment and risk treatment. Based on our experience with such organizations the following ISMS es seem to be particularly important. Requirements Management Process. Particularlyforhealth care an appropriate protection of personal data needs to be ensured considering specific legal and compliance requirements like national data protection laws and health care specific requirements. Also questions like who owns the data? should be answered in this context [36]. Process to Control Outsourced Processes. Giventhatcloud computing in its various models is a form of outsourcing of information computing services, the to control those outsourced es is key to information security.
5 The Scientific World Journal 5 High R1 Likelihood Medium R1R R2R R2 Low Low Medium Consequences Figure 2: Risk map. High As known from classic outsourcing the compliance of the serviceproviderwiththedefinedrequirementsshouldalsobe audited frequently while using cloud services. An increased usage of different and changing subservice providers (chaining) is often used to increase the flexibility of the service provisiontokeepitalwaysinlinewiththedemand.asaresult of this the changing subservice providers and services as well as the location of the computing are mostly nontransparent for the customer. The involved (sub)service providers, locations, and countries in which the information computing isperformedaswellasspecificsecurityrequirementsand measures should be defined in the contract between health care organization and cloud service provider. Information Security Incident Management Process. For all significant or informative incidents, basic data (what, who, when,where,risk,andconsequences)shouldbeloggedso that it can be passed on to the relevant people (notify), so that they can recommend and/or take the necessary local action [37]. Considering many involved parties using cloud computing incident management es for all involved parties and their interfaces should be defined to ensure appropriate information of the health care organization using cloud computing of relevant incidents. Also for biomedical researchers, those es are important because their work includes image analysis, data mining, protein folding, and gene sequencing which requires computingcapacityaswellasanappropriatemanagementof information security [38]. 4. Evaluation Results Evaluation of the proposed framework is currently being conducted in a real-life setting within two organizations. Organization 1 is a pharmaceutical company. Currently, the framework is being implemented in the whole organization. The implementation led to a documented and evaluated set of requirements of risks where previously only a subjective and not documented understanding of requirements and risks existed. Particularly, in two cases this helped the organization to focus on resources to treat major risks which were previously overlooked. Additionally, two audits of outsourced es software development and data center housing were performed in which additional risks and necessary improvements were identified. Figure 2 shows an anonymized example of the resulting risk map with two risks regarding the outsourced es (R1 and R2) as well as the resulting risk after risk treatment (R1R and R2R). Organization 2 is an IT service provider which also provides services to health care companies. Currently, the framework is being implemented in the whole organization. Key benefit is also a broad understanding of requirements of the different customers and related risks from an information security perspective and the resulting precise usage of limited resources. Especially the documentation of the results of requirements analysis, risk assessment and treatment enables the organization to deal with audits of their customers more efficient as shown in Figure 3. Resources to search and provide relevant information within customer audits and within the change management decreased after the initial implementation of the ISMS by an average of 70%. Preliminary results from this evaluation seem to confirm the applicability of the proposed framework to address the posited objectives. In both cases especially an appropriate identification and understanding of relevant requirements were key to provide significant benefits. All the following es rely on a proper understanding of the relevant requirements. Missing or wrong information regarding relevant requirements results in uncertain or wrong decisions and finally in higher
6 6 The Scientific World Journal Man-days Resources spent for customer audits Audit 1 Audit 2 Audit 3 Audit 4 Before ISMS With ISMS Figure 3: Resources needed to conduct customer audits. cost and/or risks compared with decisions while all relevant requirements were identified and understood. So cloud computing combined with identified and understood security requirements also enables tailored on demand security controls as a benefit [4]. 5. Conclusions and Future Work Research on the various security issues regarding information computing in health care environments has been done in the past. While other researchers focus on specific issues like access control or cryptographic controls [1, 36] a broader view at the ISMS es is also required. Asshowninthisworkfromtheperspectiveofahealth care organization using cloud computing the es (i) information security risk assessment, (ii) information security risk treatment, (iii) the control of outsourced es, (iv) requirements management, (v) information security incident management are key to ensuring an appropriate information security. Considering this result and limited resources as well as ensuring an efficient use of those resources, not every ISMS shouldbeestablishedandoperatedatthesamelevel of maturity. Therefore a health care organization using cloud computing should focus on the identified es of information security risk assessment, information security risk treatment, the control of outsourced es, and requirements management. Particularly for these es an adequate level of maturity is needed. In this context future, work is necessary to develop a more detailed framework of ISMS es (input, output, and interfaces) and their interaction at an activity level to ensure an appropriate interaction of the ISMS es. WhilenoteveryISMSneedsthesamelevelof maturity,alsoanapproachshouldbedevelopedtoidentify the appropriate level of maturity using a proper maturity level model. By considering a maturity level model for ISMS es combined with an approach for the determination of the necessary maturity level, the appropriateness of an ISMS can be made transparent and unnecessary costs of information governancecanbeavoided. Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. References [1] R. Zhang and L. Liu, Security models and requirements for healthcare application clouds, in Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD 10),pp , July [2] M. Almorsy, J. Grundy, and I. Müller, An analysis of the cloud computing security problem, in Proceedings of the Asia Pacific Cloud Workshop, Colocated with Asia Pacific Software Engineering Conference (APSEC 10),Sydney,Australia,2010. [3]R.Buyya,C.S.Yeo,S.Venugopal,J.Broberg,andI.Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems,vol.25,no.6,pp ,2009. [4] R. Colomo-Palacios, E. Fernandes, M. Sabbagh, and A. de Amescua Seco, Human and intellectual capital management in the cloud: software vendor perspective, The Journal of Universal Computer Science,vol.18,no.11,pp ,2012. [5]J.J.Rodrigues,I.delaTorre,G.Fernández, and M. López- Coronado, Analysis of the security and privacy requirements of cloud-based Electronic Health Records Systems, Journal of Medical Internet Research,vol.15,no.8,2013. [6] D. J. Solove, HIPAA turns 10: analyzing the past, present, and future impact, SSRN Scholarly , Social Science Research Network, Rochester, NY, USA, [7] J. Kwon and M. E. Johnson, Security practices and regulatory compliance in the healthcare industry, Journal of the American Medical Informatics Association,vol.20,no.1,pp.44 51,2013. [8] M. Böhm, S. Leimeister, C. Riedl, and H. Krcmar, Cloud Computing Outsourcing 2.0 or a new Business Model for IT Provisioning? in Application Management, F. Keuper, C. Oecking, and A. Degenhardt, Eds., pp , Gabler, [9] B. Rochwerger, D. Breitgand, E. Levy et al., The Reservoir model and architecture for open federated cloud computing, IBM Journal of Research and Development, vol.53,no.4,pp , [10] M. Armbrust, A. Fox, R. Griffith et al., A view of cloud computing, Communications of the ACM,vol.53, no.4,pp , [11] L. Wang, J. Tao, M. Kunze, A. C. Castellanos, D. Kramer, and W. Karl, Scientific cloud computing: early definition and experience, in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC 08), pp , September [12] K. U. Ruhse and M. Baturova, Cloud computing: cloud computing as an integral part of a modern IT strategy, ISACA Journal,vol.3,p.6,2012.
7 The Scientific World Journal 7 [13] M. Böhm, S. Leimeister, C. Riedl, and H. Krcmar, Cloud Computing and Computing Evolution, TUM Technische Universität München, [14] P. M. Mell and T. Grance, Sp the nist definition of cloud computing, [15]K.Petruch,V.Stantchev,andG.Tamm, AsurveyonITgovernance aspects of cloud computing, International Journal of Web and Grid Services,vol.7,no.3,pp ,2011. [16] V. Sambamurthy, A. Bharadwaj, and V. Grover, Shaping agility through digital options: reconceptualizing the role of information technology in contemporary firms, MIS Quarterly, vol. 27, no. 2, pp , [17] A. Martins and J. Elofe, Information Security Culture,Springer, [18] German Federal Office for Information Security, BSI-Standard 100-1, Bonn, Germany, [19] International Organization for Standardisation and International Electrotechnical Commission, ISO/IEC, 27001, Geneva, Switzerland, [20] International Organization for Standardisation and International Electrotechnical Commission, ISO/IEC, 27002, Geneva, Switzerland, [21] German Federal Office for Information Security, IT-Grundschutz Catalogues, Bonn, Germany, 13th edition, [22] F. Sabahi, Cloud computing security threats and responses, in Proceedings of the IEEE 3rd International Conference on Communication Software and Networks (ICCSN 11), pp , May [23] S. Yassa, R. Chelouah, H. Kadima, and B. Granado, Multiobjective approach for energy-aware workflow scheduling in cloud computing environments, The Scientific World Journal, vol.2013,articleid350934,13pages,2013. [24] R. A. Caralli, J. F. Stevens, B. J. Willke, and W. R. Wilson, The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management, July [25] H. Takabi, J. B. D. Joshi, and G.-J. Ahn, Security and privacy challenges in cloud computing environments, IEEE Security and Privacy,vol.8,no.6,pp.24 31,2010. [26] I. Foster, Y. Zhao, I. Raicu, and S. Lu, Cloud Computing and Grid Computing 360-degree compared, in Proceedings of the Grid Computing Environments Workshop (GCE 08), pp.1 10, November [27] W. Hau and R. Araujo, Virtualization and Risk-Key Security Considerations for Your Enterprise Architecture,McAfee,2007. [28] X. Xi, Y. Xu, and H. Todo, The Present Situation of IT Outsourcing and Countermeasure, [29] X. Yu and Q. Wen, A protect solution for data security in mobile cloud storage, vol. 8784, pp F F-6, [30] M. Missbach, J. Stelzel, C. Gardiner, G. Anderson, and M. Tempes, Change and configuration management, in SAP on the Cloud, pp , Springer, Berlin, Germany, [31] A. Parveen, S. Habib, and W. Ahmad, The cloud-changing the Indian Healthcare System, [32] International Organization for Standardisation and International Electrotechnical Commission, ISO/IEC, 27000, Geneva, Switzerland, [33] International Organization for Standardisation and International Electrotechnical Commission, ISO, 9000, Geneva, Switzerland, [34] International Organization for Standardisation and International Electrotechnical Commission, ISO/IEC, 27003, Geneva, Switzerland, [35] BSI UK, Moving from ISO/IEC, 27001:2005 to ISO/IEC, 27001:2013, Keynes, Milton, Ga, USA, [36] M. Meingast, T. Roosta, and S. Sastry, Security and privacy issues with health care information technology, in Proceedings ofthe28thannualinternationalconferenceoftheieeeengineering in Medicine and Biology Society (EMBS 06), pp , September [37] W. B. Runciman, J. A. H. Williamson, A. Deakin, K. A. Benveniste,K.Bannon,andP.D.Hibbert, Anintegratedframework for safety, quality and risk management: an information and incident management system based on a universal patient safety classification, Quality and Safety in Health Care, vol.15, no. 1, pp. i82 i90, [38]A.Rosenthal,P.Mork,M.H.Li,J.Stanford,D.Koester,and P. Reynolds, Cloud computing: a new business paradigm for biomedical information sharing, Journal of Biomedical Informatics, vol. 43, no. 2, pp , 2010.
8 Journal of Industrial Engineering Multimedia The Scientific World Journal Applied Computational Intelligence and Soft Computing International Journal of Distributed Sensor Networks Fuzzy Systems Modelling & Simulation in Engineering Submit your manuscripts at Journal of Computer Networks and Communications Advances in Artificial Intelligence Hindawi Publishing Corporation International Journal of Biomedical Imaging Volume 2014 Artificial Neural Systems International Journal of Computer Engineering Computer Games Technology Software Engineering International Journal of Reconfigurable Computing Robotics Computational Intelligence and Neuroscience Human-Computer Interaction Journal of Journal of Electrical and Computer Engineering
Cloud Template, a Big Data Solution
Template, a Big Data Solution Mehdi Bahrami Electronic Engineering and Computer Science Department University of California, Merced, USA [email protected] Abstract. Today cloud computing has become
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
A Secure System Development Framework for SaaS Applications in Cloud Computing
A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational
Compliance in Clouds A cloud computing security perspective
Compliance in Clouds A cloud computing security perspective Kristian Beckers, Martin Hirsch, Jan Jürjens GI Workshop: Governance, Risk & Compliance on the 19th of March 2010 What is Cloud Computing? Today:
THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 5, May 2013, pg.238
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Cloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert [email protected], [email protected] Yildiz Technical University (Turkey) Abstract
The Cadence Partnership Service Definition
The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia [email protected] 2 MIRACL Lab, FSEG, University
Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER
Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) [email protected] / @tukkajukka 30.10.2013 1 e arrival
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
Security and Compliance in Clouds: Challenges and Solutions
Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de This Talk What are the challenges?
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Service Measurement Index Framework Version 2.1
Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index
Implementing & Developing Cloud Computing on Web Application
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
Preface Introduction
Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
Geoprocessing in Hybrid Clouds
Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. [email protected]
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,
Security und Compliance in Clouds
Security und Compliance in Clouds Prof. Dr. Jan Jürjens, Kristian Beckers Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de The NIST Cloud Definition Framework
Fundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Market Maturity. Cloud Definitions
HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Evaluation Model for Internet Cloud Data Structure Audit System
Evaluation Model for Internet Data Structure Audit System Wang Fan School of Accounting Zhejiang Gongshang University Hangzhou, 310018, P. R.China [email protected] Journal of Digital Information Management
Cloud Computing-based IT Solutions For Organizations with Multiregional Branch Offices
Cloud Computing-based IT Solutions For Organizations with Multiregional Branch Offices Harris Wang School of Computing and Information Systems Athabasca University, Athabasca, Canada [email protected]
EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care
EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
A Trust-Evaluation Metric for Cloud applications
A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow
CHOOSING THE RIGHT CLOUD COMPUTING SOLUTION FOR YOU
CHOOSING THE RIGHT CLOUD COMPUTING SOLUTION FOR YOU ABSTRACT Dan Smedescu This article provides an introduction to cloud computing and choosing a vendor. The first part includes definitions and service
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Theme 1: IT Governance and Audit Methodologies
Theme 1: IT Governance and Audit Methodologies Recent rapid development of new IT technologies was followed up by an instantaneous integration of them at the organizational level. The management of the
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Hybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity
Reprinted from PHARMACEUTICAL ENGINEERING THE OFFICIAL TECHNICAL MAGAZINE OF ISPE JANUARY/FEBRUARY 2014, VOL 34, NO 1 Copyright ISPE 2014 www.pharmaceuticalengineering.org information systems in a GxP
Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.
Table of Contents Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined. 1.1 Cloud Computing Development... Error! Bookmark not
Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners
CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Survey on Security Issues and Solutions in Cloud Computing
Survey on Security Issues and Solutions in Cloud Computing D.Gnanavelu 1 (Research Scholars), Computer Science, Meenakshi University, K.K Nagar, Chennai-78, Tamil Nadu, India Dr. G.Gunasekaran 2, Principal,
This document is a preview generated by EVS
TECHNICAL REPORT ISO/IEC TR 20000-9 First edition 2015-02-15 Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services Technologies de l information
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework
International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 95 101 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S SLA Based Information Security Metric
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014
Electronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
NATO s Journey to the Cloud Vision and Progress
NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,
Model-Driven Cloud Data Storage
Model-Driven Cloud Data Storage Juan Castrejón 1, Genoveva Vargas-Solar 1, Christine Collet 1, and Rafael Lozano 2 1 Université de Grenoble, LIG-LAFMIA, 681 rue de la Passerelle, Saint Martin d Hères,
Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
Risk Management Framework for IT-Centric Micro and Small Companies
Risk Management Framework for IT-Centric Micro and Small Companies Jasmina Trajkovski 1, Ljupcho Antovski 2 1 Trajkovski & Partners Management Consulting Sveti Kliment Ohridski 24/2/1, 1000 Skopje, Macedonia
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
