Enterprise Cloud Computing (ECC): Security Model for SMEs Data in The Cloud
|
|
|
- Erick Casey
- 10 years ago
- Views:
Transcription
1 Enterprise Cloud Computing (ECC): Security Model for SMEs Data in The Cloud
2 About Me Name: Rania Fahim El-Gazzar Home country: Egypt Education: Bachelor in Business Administration, Major Management Information Systems Master in Information Systems, topic Agent Based Mobile Event Notification System PhD in Information Systems, currently I am a PhD research fellow in information systems department at University of Agder. Current research interest: Security issues related to Cloud Computing adoption in SMEs.
3 Research Studies on The Cloud( ) Source: Yang et al. (2012)!
4 Enterprise Cloud Computing (ECC) Benefits from ECC for SMEs: Lower IT-related cost: eliminating costs of establishing and maintenance of IT infrastructure. Speed: self-service access to an available pool of shared and scalable computing resources. Better IT support: new applications can be approved and deployed quickly. Agility. Competitive advantage. The Cloud
5 Enterprise Cloud Computing (ECC) Challenges to ECC for SMEs: Security: data privacy and trust issues Vendor lock-in Lack of standards: related to data privacy and SLA as any new computing technology Lack of control: in terms of SMEs don t have skills to control their data in the cloud. Integration with in-house systems SMEs might be reluctant to adopt cloud sevices because they don t have the financial resources and skills needed for secure cloud solutions Enterprise s IT manager IT managers with their managerial and technical skills are trying to make the right decision about Enterprise cloud adoption!
6 Perspectives on Cloud Security Enterprise perspective: Data privacy, trust issues, security solutions with reasonable cost, availability, and reliability Security Cloud vendor perspective: Data Encryption, authentication, authorization, data recovery, network security, and access control
7 Towards Successful Cloud Deployment Technical Capabilities Managerial Capabilities Relational Capabilities (Vendor-Client relationship) Success of Cloud Deployment Scalable IT infrastructure that eases integration with cloud services Capability of IT managers to better decide among cloud services and implement cloud solutions that complement business strategy Trust between the IT manager and cloud vendor
8 Research Objective To identify the security issues related to cloud computing that affect SMEs choice to adopt cloud services as well as the major concerns of data security risks to propose a proper model to secure SMEs data in the cloud.
9 Research Questions What are the cloud-specific security risks associated with cloud computing and the priorities of these risks? What are the data protections and privacy concerns for the SMEs data in the cloud? How data security affects SMEs choice to adopt cloud services? What are the data security policies offered in the cloud? How effective they are? And are they enough to persuade SMEs to move to the cloud?
10 Theoretical Foundation Potential theories to invistigate the problem: Institutional theory Information infrastructures theory Socio-technical theory
11 Methodology Proposed Methodologies: Qualitative: Literature review Case study Design research Quantitative: Measuring security-cost related issues (if a representative sample is available)
12 Expected Contribution Contribution to literature: Study the effect of security improvements on the enterprise choice and cost, as well as the security models implemented previously and how they contributed to securing SMEs data in the cloud. Contribution to practice: A developed security model that: Makes SMEs more confident in their choice of adopting cloud services. Guarantee data confidentiality, integrity, and availability. The security model is applied on a case study and evaluated against security standards determined for the cloud.
13 References Yang, Haibo and Tate, Mary (2012) "A Descriptive Literature Review and Classification of Cloud Computing Research, Communications of the Association for Information Systems: Vol. 31, Article 2. Available at: Oracle Cloud Computing, white paper, Oracle Corp., May Cloud computing: Marketing hype or sound business strategy? white paper, Verizon, September Introduction to Cloud Computing, white paper, Dialogic Corporation, July J. W. Rittinghouse and J. F. Ransome, Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, p Gary Garrison, Sanghyun Kim, and Robin L. Wakefield Success factors for deploying cloud computing. Commun. ACM 55, 9 (September 2012), DOI= /
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Adopting Cloud Computing with a RISK Mitigation Strategy
Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines
APPENDIX to http://dx.doi.org/10.4338/aci-2014-09-ra-0083 CAHIIM 2012 Curriculum Requirements Health Informatics Master s Degree
APPENDIX to http://dx.doi.org/10.4338/aci-2014-09-ra-0083 CAHIIM 2012 Curriculum Requirements Health Informatics Master s Degree Column 1 - Health Informatics Facet I. Information Systems concerned with
A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services
A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services Department of Computer Science presented at the 1 st International Workshop on Pervasive Web Mapping, Geoprocessing
Success Factors for Deploying Cloud Computing
Trust between client organization and cloud provider is a strong predictor of successful cloud deployment. Success Factors for Deploying Cloud Computing doi:10.1145/2330667.2330685 By Gary Garrison, Sanghyun
Without the need to purchase hardware, software licenses, or implementation services, an organization can deploy cloud computing rapidly.
This paper seeks to help in that process. It provides a high-level overview of cloud computing models (discussed previously), outlines some of the important benefits it could deliver to higher education,
How do we define cloud computing?
How do we define cloud computing? On Demand Self Service customer can provision computing resources without requiring interaction with the service provider. Broad Network Access computing resources are
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.
Clarity in the Cloud Defining cloud services and the strategic impact on businesses. Table of Contents Executive Summary... 3 Cloud Services... 4 Clarity within the Cloud... 4 Public Cloud Solution...
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING
CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING Introduction The cloud market has matured, and many IT professionals are exploring advanced topics in cloud architecture and deployment, covering
What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.
What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing. What is Cloud-Based Security? Cloud computing is: IT services via the internet from an external service provider
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Can Cloud Database PaaS Solutions Replace In-House Systems?
Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING
A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING Grozdalina Grozeva 1, Yordan Dimitrov 2 1 Department of Management, Technical University, Bulgaria, E-mail: [email protected] 2 Department of Management, Technical
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
CLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
CLOUDCATALYST. Cloud Trends and Critical Success Factors for European SMEs
CLOUDCATALYST Cloud Trends and Critical Success Factors for European SMEs INDEX CLOUDCATALYST PROJECT: BACKGROUND, OBJECTIVES, OUTPUTS AND TARGETS CLOUD COMPUTING TRENDS: SURVEY DEMOGRAPHICS, KEY FINDINGS
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile Jerry Wertelecky, CPA, Fellow HKIoD & Managing Director INTRODUCTION Jerry Wertelecky Country of Birth: United States Current
Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia
2014 IEEE 6th International Conference on Cloud Computing Technology and Science Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia Nouf Alkhater Gary Wills Robert
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
pavcloud PaaS IaaS VaaS DCaaS For orders and information call 01273 834 000 or email: [email protected] FEATURES: BENEFITS: DCaaS VaaS IaaS PaaS
Factsheet : pavcloud For orders and information With increased focus on maximising the financial resources of your IT department along with improving service agility, flexibility and availability, many
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
Building Private & Hybrid Cloud Solutions
Solution Brief: Building Private & Hybrid Cloud Solutions WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction When most
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
CLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
White Paper. Deploying and Provisioning Databases in the Cloud: How Tesora s Database as a Service (DBaaS) Platform is Transforming Enterprise IT
White Paper Deploying and Provisioning Databases in the Cloud: How Tesora s Database as a Service (DBaaS) Platform is Transforming Enterprise IT When IT Departments Can t Deliver, People Go Elsewhere Over
Cloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
M2M/IoT, Cloud, Big Data and Analytics: Market Dynamics and Opportunities
Brochure More information from http://www.researchandmarkets.com/reports/2888831/ M2M/IoT, Cloud, Big Data and Analytics: Market Dynamics and Opportunities Description: Technology and market advances in
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
White paper Reaping Business Value from a Hybrid Cloud Strategy
White paper Fujitsu Hybrid Cloud Services White paper Reaping Business Value from a Hybrid Cloud Strategy How to embrace a hybrid cloud model to maximize the benefits of public and private cloud services
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Overview Cloud computing has emerged as a business IT solution that provides a new way to manage and deliver automated computing services to consumers via the Internet (Shawish
The Hybrid Cloud Approach: CA ARCserve D2D On Demand
The Hybrid Cloud Approach: CA ARCserve D2D On Demand Small businesses benefit from a hybrid cloud solution for data backup and recovery White Paper Published: January 2012 Applies to: Microsoft Windows
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
Auditing Cloud Computing and Outsourced Operations
Session 136 Auditing Cloud Computing and Outsourced Operations Monday, May 7, 2012 3:30 PM 5:00 PM Mike Schiller Director of Sales & Marketing IT, Texas Instruments Co Author, IT Auditing: Using Controls
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Cloud Services. More agility. More freedom. More choice.
Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
12/1/2014. Cybersecurity and Cloud Services Compliance Considerations. Community Medical Centers. Cedars-Sinai. Dec. 5, 2014 San Francisco
Cybersecurity and Cloud Services Compliance Considerations Dec. 5, 2014 San Francisco Katie Gorris, CHC,CHPS,CHPC Privacy Manager, Corporate Integrity Program Cedars-Sinai Health System [email protected]
Uniting IAM and data protection for greater security
E-Guide Uniting IAM and data protection for greater security There's been a new development in the information security world: content-aware identity and access management, an integration of two established,
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012
Cloud Archive Trends and Challenges PASIG Winter 2012 Raymond A. Clarke Enterprise Storage Consultant, Oracle Enterprise Solutions Group How Is PASIG Pronounced? Is it PASIG? Is it
Risk Management Considerations in Cloud Computing Adoption
Page 1 Executive Briefing, August 2012 Eileen Doherty, Dr Marian Carcary and Gerard Conway Risk Management Considerations in Cloud Computing Adoption Abstract Information and Communication Technology (ICT)
Always On Infrastructure for Software as a Ser vice
Solution Brief: Always On Infrastructure for Software as a Ser vice WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction
Trends in Cloud Computing in Higher Education
An white paper sponsored by ViON Trends in Cloud Computing in Higher Education Colleges and universities are making their way into cloud computing unevenly, but with a sense of inevitability. How are higher
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. [email protected]
Enterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives
Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University [email protected]
