DocumentCode :
2379903
Title :
How to manage information security in cloud computing
Author :
Wang, Jen-Sheng ; Liu, Che-Hung ; Lin, Grace TR
Author_Institution :
Inst. of Manage. of Technol., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
fYear :
2011
fDate :
9-12 Oct. 2011
Firstpage :
1405
Lastpage :
1410
Abstract :
The debut of the Cloud Computing generation has made information security managing a most significant and critical issue. However, the successful management of information security in cloud computing requires certain factors. This study aims to collect Key Success Factors (KSFs) that determine the management information security in cloud computing through literature review and design of a questionnaire survey. This comprises four major aspects: (1) External dimension, (2) Internal dimension, (3) Technology dimension, and (4) Execution dimension. Based on these, we proceed with categorization and analysis using Fuzzy Analytic Hierarchy Process (Fuzzy AHP or FAHP), which we applied in this study to overcome the seeming failure of general Analytical Hierarchy Process (AHP) in dealing with respondents´ impersonal differences in paired comparison. The objectives under each aspect ranked in order from security function, system, organization, operation, market, legislation, human resource, to mechanism. The results sifted from the FAHP approach suggest six top key success factors: “Authentication”, “Disclosure Preventing”, “Encryption”, “Service Model”, “Interface”, and “Customer”. Different to conventional information security, security in cloud computing emphasizes more market-oriented factors.
Keywords :
cloud computing; cryptography; decision making; fuzzy set theory; authentication; cloud computing generation; customer; disclosure preventing; encryption; execution dimension; external dimension; fuzzy analytic hierarchy process; general analytical hierarchy process; information security management; interface; internal dimension; key success factors; literature review; questionnaire survey; service model; technology dimension; Cloud computing; Computational modeling; Information security; NIST; Privacy; Cloud Computing; Fuzzy Analytic Hierarchy Process (FAHP); Information Security; Key Success Factors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on
Conference_Location :
Anchorage, AK
ISSN :
1062-922X
Print_ISBN :
978-1-4577-0652-3
Type :
conf
DOI :
10.1109/ICSMC.2011.6083866
Filename :
6083866
Link To Document :
بازگشت