5 research outputs found

    The factors affecting on managing sensitive data in cloud computing

    Get PDF
    Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment

    MANAGING SENSITIVE DATA IN CLOUD COMPUTING FOR EFFECTIVE INFORMATION SYSTEMS’ DECISIONS

    Get PDF
    The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed, a structured interview with experts working on cloud computing and a pilot study conduct to explore the main objectives of framework. The framework using multilevel to enhance management information system on sensitive data in cloud

    Cloud computing sensitive data protection using multi layered approach

    Get PDF
    Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. This paper discusses challenges related to data security and privacy implementation in cloud computing environment. A framework is proposed to accommodate the protection of sensitive data in cloud computing environment. This framework consists of three levels authorization, security and privacy and saves and verifies level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and sensitive data in cloud environment

    A multi-level framework for efficient sensitive data transmission in cloud computing

    Get PDF
    Cloud computing, as a growing field, can provide the needs of enterprises and individuals to access cloud computing resources and meet their organizational computing requirements. The popularity of cloud computing is characterized by a number of great features, such as scalability, low cost and unlimited resources. These features have encouraged many organizations and individuals to transfer their data over the cloud. However, cloud computing is constrained by security and privacy issues, particularly by factors on confidentiality, integrity, availability and privacy, apart from access control, management and internal attacks. These issues have become a major challenge in using the cloud, especially when dealing with sensitive data. The aim of this study is to address the problem of protection in terms of privacy and security of data from the perspective of management of information systems (MIS) and its decision-making process. Here, the factors related to the management and protection of sensitive data in cloud computing are data confidentiality (DC), data integrity (DI), data privacy (DP) and data availability (DA). The analyses of these factors are performed on the basis of the interests of managers and individuals whose aim is to protect sensitive data over the cloud. The experimental study in this research includes a pilot study, the development of a tool as a proof of concept and an experts’ interview. The tool, which is developed on the basis of the proposed framework, is verified by the interviewed experts and through tool execution. The results from the interviews confirm the validity and workability of the proposed framework in enhancing the decision making of MIS and managing and protecting sensitive data over the cloud. Subsequently, the anonymization method of the proposed framework is compared with the encryption approach of previous work. The research applies the anonymization technique and classifies the contents of a sensitive data file by the k-anonymity technique, which can efficiently protect sensitive data and reduce the transmission time and size of a file sent over the cloud. The digital signature of the file containing sensitive data is generated and sent together with the file to ensure DI. Private and confidential data management issues of intrusion and data loss over the cloud are solved by using the proposed multi-level framework, which applies the method of responsible participation to maintain DC and DA upon request—the other major contribution of this research. This study has achieved its stated objectives. The results obtained by the experimental study are aligned with the proposed framework and the concept of protection and management of private confidential data for effective information management decision making

    Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment

    No full text
    The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.  
    corecore