Abstract

Cloud computing has attracted more and more attention as it reduces the cost of IT infrastructure of organizations. In our country, business Cloud services, such as Alibaba Cloud, Huawei Cloud, QingCloud, UCloud and so on are gaining more and more uses, especially small or median organizations. In the cloud service scenario, the program and data are migrating into cloud, resulting the lack of trust between customers and cloud service providers. However, the recent study on Cloud computing is mainly focused on the service side, while the data security and trust have not been sufficiently studied yet. This paper investigates into the data security issues from data life cycle which includes five steps when an organization uses Cloud computing. A data management framework is given out, including not only the data classification but also the risk management framework. Concretely, the data is divided into two varieties, business and personal information. And then, four classification levels (high, medium, low, normal) according to the different extent of the potential adverse effect is introduced. With the help of classification, the administrators can identify the application or data to implement corresponding security controls. At last, the administrators conduct the risk assessment to alleviate the risk of data security. The trust between customers and cloud service providers will be strengthen through this way.

Highlights

  • Cloud computing is growing more and more attraction in recent years, as it has transformed the way organizations approach IT, reducing the IT cost by the novel service models

  • By the transforming of control of the application and data, organizations can gain the benefits in both efficiency and effectiveness, as well as reduce the expenses in purchasing and sustaining the infrastructure, especially for the acceptance of the public cloud computing

  • Many reports show that the cloud computing market continues to grow explosively

Read more

Summary

Introduction

Cloud computing is growing more and more attraction in recent years, as it has transformed the way organizations approach IT, reducing the IT cost by the novel service models. By the transforming of control of the application and data, organizations can gain the benefits in both efficiency and effectiveness, as well as reduce the expenses in purchasing and sustaining the infrastructure, especially for the acceptance of the public cloud computing. According to reports from Gartner [2], in 2017, the worldwide public cloud services market grows 18 percent to. How do you use the benefits of the cloud while maintaining security control over your organization's applications and data? The infrastructure is provided for dedicated use by a single organization offering service to multiple consumers.

Data security in life cycle
Collect
Storage
Delivery
Destroy
Data classification
Risk assessment framework
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call