首页    期刊浏览 2024年11月30日 星期六
登录注册

文章基本信息

  • 标题:Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS)
  • 本地全文:下载
  • 作者:Kamariah Abu Saed ; Norshakirah Aziz ; Said Jadid Abdulkadir
  • 期刊名称:International Journal of Advanced Computer Science and Applications(IJACSA)
  • 印刷版ISSN:2158-107X
  • 电子版ISSN:2156-5570
  • 出版年度:2018
  • 卷号:9
  • 期号:10
  • DOI:10.14569/IJACSA.2018.091036
  • 出版社:Science and Information Society (SAI)
  • 摘要:Security checklist is an important element in measuring the level of computing security, especially in cloud computing. Vulnerability in cloud computing become major concern because it will lead to security issue. While security awareness and training can educate users on the severe impact of malware, implementation on data governance and security checklist also can help to reduce the risk of being attacked. Since security checklist is important element to measure security level in cloud computing, data governance can help to manage data right with correct procedure. Due to increasing threats and attacks, service providers and service consumers need to adhere to guidelines and/or checklists when measuring the security level of services and to be prepared for unforeseen circumstances, especially in the IaaS platform. As the IaaS platform lies at the lower level in cloud computing where data are stored, it is vital that IaaS security be given serious consideration to prevent not only data breaches but also data losses. The objective of this paper is to discuss the implementation of security checklist in IaaS layer. In this paper also, several studies related with security assessment and checklist that had been discussed and developed by previous researchers and professional bodies will be discussed. This paper will also discuss the result from interview session that had been conducted by the author with several data centers (DCs) and experts regarding the implementation of security measures in small cloud DCs.
  • 关键词:IaaS; security checklist; guidelines; threats; cloud computing
国家哲学社会科学文献中心版权所有