A management view of security and cloud computing

Ndubuisi Anomelechi, William Cooper, Bob Duncan, John Lamb

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

Abstract

Cloud security is often seen as a technical problem. We argue that its solution needs both technical and management input. We find that cloud computing offers reliability and flexibility and its low cost makes it attractive, particularly to small and medium sized enterprises. We note that security technology must be adopted universally and often promptly. It requires both an organisational commitment and an individual commitment, which is most readily obtained if the technology places a low knowledge burden on users: that is, it is transparent or adds only a few, often-repeated, tasks. We note that providers have already achieved this in many cloud services. Organisations need clarity of what security is provided and who is responsible for breaches. They also need cloud providers to help them identify and recover from breaches. We consider why breaches have now become a hot topic, and provide a suggestion of how to mitigate the impact of these whilst meeting our management objectives and complying with the forthcoming EU General Data Protection Regulation.
Original languageEnglish
Title of host publicationThe Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
EditorsBob Duncan, Yong Woo Lee, Aspen Olmsted
PublisherIARIA
Pages25-30
Number of pages6
ISBN (Print)978-1-61208-607-1
Publication statusPublished - Feb 2018
EventThe Ninth International Conference on Cloud Computing, GRIDs, and Virtualization - Barcelon, Spain
Duration: 18 Feb 201822 Feb 2018

Publication series

NameCloud Computing 2018
PublisherIARIA
ISSN (Print)2308-4294

Conference

ConferenceThe Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
Country/TerritorySpain
CityBarcelon
Period18/02/1822/02/18

Keywords

  • management goals
  • cloud security
  • EU GDPR

Fingerprint

Dive into the research topics of 'A management view of security and cloud computing'. Together they form a unique fingerprint.

Cite this