Cloud Data Management Policies: Security and Privacy Checklist
dc.contributor.author | Joshi, Karuna Pande | |
dc.date.accessioned | 2018-11-06T16:11:20Z | |
dc.date.available | 2018-11-06T16:11:20Z | |
dc.date.issued | 2014-05-08 | |
dc.description | 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta | en_US |
dc.description.abstract | Organizations have complex enterprise data policies, as well as legal and statutory constraints, that require compliance. Such policies are today enforced on internal resources that are completely controlled by the organization. On moving to a cloud based solution, the organization has to often hand over this control to the service provider. Hence, acquiring cloud services requires significant human intervention and negotiation -- people have to check whether a provider’s service attributes ensure compliance with their organization’s constraints. It is critical to ensure security and privacy of data on the cloud. In fact security concerns are one of the key adoption barriers of cloud services, especially for public or hybrid cloud deployments. Multi-tenancy related security/isolation issues and cross domain cloud access/authorization are some of the important privacy issues that organizations are concerned about. In this paper we define the critical security and privacy policies that an organization adopting cloud computing must formulate to ensure their enterprise data policies and constraints are addressed by the cloud provider. These policies are part of an essential check list that should be referred to by every organization migrating to the cloud. | en_US |
dc.description.uri | https://ebiquity.umbc.edu/paper/html/id/654/Cloud-Data-Management-Policies-Security-and-Privacy-Checklist | en_US |
dc.format.extent | 1 page | en_US |
dc.genre | posters | en_US |
dc.identifier | doi:10.13016/M2WH2DJ6P | |
dc.identifier.uri | http://hdl.handle.net/11603/11887 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Information Systems Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.subject | cloud computing | en_US |
dc.subject | cloud privacy | en_US |
dc.subject | cloud security | en_US |
dc.subject | security checklist | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | Cloud Data Management Policies: Security and Privacy Checklist | en_US |
dc.type | Text | en_US |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.68 KB
- Format:
- Item-specific license agreed upon to submission
- Description: