Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
Abstract-The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed, a structured interview with experts working on cloud computing and a pilot study conduct to explore the main objectives of framework. The framework using multilevel to enhance management information system on sensitive data in cloud.Cite this article as: Haifaa Jassim Muhasin, Marzanah A. Jabar, Salfarina Abdullah, Shahreen Kasim (2017). Managing Sensitive DataIn Cloud Computing For Effective Information System' Decisions. Acta Informatica Malaysia, 1(2):01-02. THE WORKModern cloud computing technology enabled accesses to required resources such as servers, applications, network and services. The process utilizes common computing models that are based on data traffic, and regulated by a third party [1]. Hence, security and privacy remain the biggest challenge for sensitive information in cloud environment [2]. Sensitive information is defined as data that must be protected from unauthorized access to safeguard privacy and security of individual or organization [3].There are three main types of sensitive data: personal information which is sensitive, personally identifiable information; such as medical information, financial information and unique identifiers such as passport or social security numbers. The second type of sensitive data is business information; which includes any information with risk to affect the company if discovered by competitor or the public such as trade secrets, achievement plans, financial data, supplier and customer information. The third type of sensitive data is classified information; this data related to a government and is limited to level of sensitivity such as confidential, secret and top secret [3].In order to improve the management of sensitive data in public cloud domain for effective information systems decisions making, this study is conducted. This study offers to examine the factors influencing the decision of management systems on sensitive data in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objectives of framework, a pilot study by using a structured questionnaire was conducted. The results found that factors with a significant effect are; the data confidentiality, integrity, privacy, and availability. In addition, anonymity mechanism, positive significance was found with three factors; which are data confidentiality, data integrity and data privacy are influencing and supporting IS decision making. Also, defining the responsibilities, positive significance was found with the factor data privacy influence on decision maker. Based on research findings, in order for management information systems decision on sensitive data in public cloud the organization management should improve and enhance the anonymity mechanism and defining the responsibilities in a good way to support the decision maker.
Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. This paper discusses challenges related to data security and privacy implementation in cloud computing environment. A framework is proposed to accommodate the protection of sensitive data in cloud computing environment. This framework consists of three levels authorization, security and privacy and saves and verifies level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and sensitive data in cloud environment.
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.