• DocumentCode
    2379903
  • Title

    How to manage information security in cloud computing

  • Author

    Wang, Jen-Sheng ; Liu, Che-Hung ; Lin, Grace TR

  • Author_Institution
    Inst. of Manage. of Technol., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
  • fYear
    2011
  • fDate
    9-12 Oct. 2011
  • Firstpage
    1405
  • Lastpage
    1410
  • Abstract
    The debut of the Cloud Computing generation has made information security managing a most significant and critical issue. However, the successful management of information security in cloud computing requires certain factors. This study aims to collect Key Success Factors (KSFs) that determine the management information security in cloud computing through literature review and design of a questionnaire survey. This comprises four major aspects: (1) External dimension, (2) Internal dimension, (3) Technology dimension, and (4) Execution dimension. Based on these, we proceed with categorization and analysis using Fuzzy Analytic Hierarchy Process (Fuzzy AHP or FAHP), which we applied in this study to overcome the seeming failure of general Analytical Hierarchy Process (AHP) in dealing with respondents´ impersonal differences in paired comparison. The objectives under each aspect ranked in order from security function, system, organization, operation, market, legislation, human resource, to mechanism. The results sifted from the FAHP approach suggest six top key success factors: “Authentication”, “Disclosure Preventing”, “Encryption”, “Service Model”, “Interface”, and “Customer”. Different to conventional information security, security in cloud computing emphasizes more market-oriented factors.
  • Keywords
    cloud computing; cryptography; decision making; fuzzy set theory; authentication; cloud computing generation; customer; disclosure preventing; encryption; execution dimension; external dimension; fuzzy analytic hierarchy process; general analytical hierarchy process; information security management; interface; internal dimension; key success factors; literature review; questionnaire survey; service model; technology dimension; Cloud computing; Computational modeling; Information security; NIST; Privacy; Cloud Computing; Fuzzy Analytic Hierarchy Process (FAHP); Information Security; Key Success Factors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on
  • Conference_Location
    Anchorage, AK
  • ISSN
    1062-922X
  • Print_ISBN
    978-1-4577-0652-3
  • Type

    conf

  • DOI
    10.1109/ICSMC.2011.6083866
  • Filename
    6083866