Enterprise Cloud Computing (ECC): Security Model for SMEs Data in The Cloud



Similar documents
Architecting the Cloud

Adopting Cloud Computing with a RISK Mitigation Strategy

APPENDIX to CAHIIM 2012 Curriculum Requirements Health Informatics Master s Degree

A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services

Success Factors for Deploying Cloud Computing

Without the need to purchase hardware, software licenses, or implementation services, an organization can deploy cloud computing rapidly.

How do we define cloud computing?

Cloud Computing. Bringing the Cloud into Focus

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.

Cloud models and compliance requirements which is right for you?

Orchestrating the New Paradigm Cloud Assurance

CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

How To Understand Cloud Usability

Can Cloud Database PaaS Solutions Replace In-House Systems?

CLOUD COMPUTING. A Primer

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Services Catalog with Epsilon

Cloud Computing Security Issues And Methods to Overcome

A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

CLOUD MIGRATION STRATEGIES

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption

Research on Operation Management under the Environment of Cloud Computing Data Center

CLOUDCATALYST. Cloud Trends and Critical Success Factors for European SMEs

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

pavcloud PaaS IaaS VaaS DCaaS For orders and information call or FEATURES: BENEFITS: DCaaS VaaS IaaS PaaS

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Building Private & Hybrid Cloud Solutions

An Approach Towards Customized Multi- Tenancy

CLOUD COMPUTING An Overview

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

White Paper. Deploying and Provisioning Databases in the Cloud: How Tesora s Database as a Service (DBaaS) Platform is Transforming Enterprise IT

Cloud Computing: Risks and Auditing

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Key Considerations of Regulatory Compliance in the Public Cloud

M2M/IoT, Cloud, Big Data and Analytics: Market Dynamics and Opportunities

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

White paper Reaping Business Value from a Hybrid Cloud Strategy

CHAPTER 1 INTRODUCTION

The Hybrid Cloud Approach: CA ARCserve D2D On Demand

How To Manage Cloud Data Safely

Auditing Cloud Computing and Outsourced Operations

Clinical Trials in the Cloud: A New Paradigm?

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Mobile App Management:

Cloud Services. More agility. More freedom. More choice.

How to ensure control and security when moving to SaaS/cloud applications

12/1/2014. Cybersecurity and Cloud Services Compliance Considerations. Community Medical Centers. Cedars-Sinai. Dec. 5, 2014 San Francisco

Uniting IAM and data protection for greater security

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012

Risk Management Considerations in Cloud Computing Adoption

Always On Infrastructure for Software as a Ser vice

Trends in Cloud Computing in Higher Education

Deploying a Geospatial Cloud

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Enterprise Architecture Review Checklist

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives

Transcription:

Enterprise Cloud Computing (ECC): Security Model for SMEs Data in The Cloud

About Me Name: Rania Fahim El-Gazzar Home country: Egypt Education: Bachelor in Business Administration, Major Management Information Systems Master in Information Systems, topic Agent Based Mobile Event Notification System PhD in Information Systems, currently I am a PhD research fellow in information systems department at University of Agder. Current research interest: Security issues related to Cloud Computing adoption in SMEs.

Research Studies on The Cloud(2008-2011) Source: Yang et al. (2012)!

Enterprise Cloud Computing (ECC) Benefits from ECC for SMEs: Lower IT-related cost: eliminating costs of establishing and maintenance of IT infrastructure. Speed: self-service access to an available pool of shared and scalable computing resources. Better IT support: new applications can be approved and deployed quickly. Agility. Competitive advantage. The Cloud

Enterprise Cloud Computing (ECC) Challenges to ECC for SMEs: Security: data privacy and trust issues Vendor lock-in Lack of standards: related to data privacy and SLA as any new computing technology Lack of control: in terms of SMEs don t have skills to control their data in the cloud. Integration with in-house systems SMEs might be reluctant to adopt cloud sevices because they don t have the financial resources and skills needed for secure cloud solutions Enterprise s IT manager IT managers with their managerial and technical skills are trying to make the right decision about Enterprise cloud adoption!

Perspectives on Cloud Security Enterprise perspective: Data privacy, trust issues, security solutions with reasonable cost, availability, and reliability Security Cloud vendor perspective: Data Encryption, authentication, authorization, data recovery, network security, and access control

Towards Successful Cloud Deployment Technical Capabilities Managerial Capabilities Relational Capabilities (Vendor-Client relationship) Success of Cloud Deployment Scalable IT infrastructure that eases integration with cloud services Capability of IT managers to better decide among cloud services and implement cloud solutions that complement business strategy Trust between the IT manager and cloud vendor

Research Objective To identify the security issues related to cloud computing that affect SMEs choice to adopt cloud services as well as the major concerns of data security risks to propose a proper model to secure SMEs data in the cloud.

Research Questions What are the cloud-specific security risks associated with cloud computing and the priorities of these risks? What are the data protections and privacy concerns for the SMEs data in the cloud? How data security affects SMEs choice to adopt cloud services? What are the data security policies offered in the cloud? How effective they are? And are they enough to persuade SMEs to move to the cloud?

Theoretical Foundation Potential theories to invistigate the problem: Institutional theory Information infrastructures theory Socio-technical theory

Methodology Proposed Methodologies: Qualitative: Literature review Case study Design research Quantitative: Measuring security-cost related issues (if a representative sample is available)

Expected Contribution Contribution to literature: Study the effect of security improvements on the enterprise choice and cost, as well as the security models implemented previously and how they contributed to securing SMEs data in the cloud. Contribution to practice: A developed security model that: Makes SMEs more confident in their choice of adopting cloud services. Guarantee data confidentiality, integrity, and availability. The security model is applied on a case study and evaluated against security standards determined for the cloud.

References Yang, Haibo and Tate, Mary (2012) "A Descriptive Literature Review and Classification of Cloud Computing Research, Communications of the Association for Information Systems: Vol. 31, Article 2. Available at: http://aisel.aisnet.org/cais/vol31/iss1/2 Oracle Cloud Computing, white paper, Oracle Corp., May 2010. Cloud computing: Marketing hype or sound business strategy? white paper, Verizon, September 2010. Introduction to Cloud Computing, white paper, Dialogic Corporation, July 2010. J. W. Rittinghouse and J. F. Ransome, Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, p. 340. Gary Garrison, Sanghyun Kim, and Robin L. Wakefield. 2012. Success factors for deploying cloud computing. Commun. ACM 55, 9 (September 2012), 62-68. DOI=10.1145/2330667.2330685 http://doi.acm.org/10.1145/2330667.2330685