Cloud Data Management Policies: Security and Privacy Checklist

dc.contributor.authorJoshi, Karuna Pande
dc.date.accessioned2018-11-06T16:11:20Z
dc.date.available2018-11-06T16:11:20Z
dc.date.issued2014-05-08
dc.description2nd International IBM Cloud Academy Conference ICA CON 2014, Atlantaen_US
dc.description.abstractOrganizations have complex enterprise data policies, as well as legal and statutory constraints, that require compliance. Such policies are today enforced on internal resources that are completely controlled by the organization. On moving to a cloud based solution, the organization has to often hand over this control to the service provider. Hence, acquiring cloud services requires significant human intervention and negotiation -- people have to check whether a provider’s service attributes ensure compliance with their organization’s constraints. It is critical to ensure security and privacy of data on the cloud. In fact security concerns are one of the key adoption barriers of cloud services, especially for public or hybrid cloud deployments. Multi-tenancy related security/isolation issues and cross domain cloud access/authorization are some of the important privacy issues that organizations are concerned about. In this paper we define the critical security and privacy policies that an organization adopting cloud computing must formulate to ensure their enterprise data policies and constraints are addressed by the cloud provider. These policies are part of an essential check list that should be referred to by every organization migrating to the cloud.en_US
dc.description.urihttps://ebiquity.umbc.edu/paper/html/id/654/Cloud-Data-Management-Policies-Security-and-Privacy-Checklisten_US
dc.format.extent1 pageen_US
dc.genrepostersen_US
dc.identifierdoi:10.13016/M2WH2DJ6P
dc.identifier.urihttp://hdl.handle.net/11603/11887
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectcloud computingen_US
dc.subjectcloud privacyen_US
dc.subjectcloud securityen_US
dc.subjectsecurity checklisten_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleCloud Data Management Policies: Security and Privacy Checklisten_US
dc.typeTexten_US

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: