Data governance cloud security checklist at infrastructure as a service (IaaS)
Security checklist is an important element in measuring the level of computing security, especially in cloud computing. Vulnerability in cloud computing become major concern because it will lead to security issue. While security awareness and training can educate users on the severe impact of malwar...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science and Information Organization
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/86608/1/NoorHafizahHassan2018_DataGovernanceCloudSecurityChecklist.pdf http://eprints.utm.my/id/eprint/86608/ http://dx.doi.org/10.14569/IJACSA.2018.091036 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.86608 |
---|---|
record_format |
eprints |
spelling |
my.utm.866082020-09-30T08:44:03Z http://eprints.utm.my/id/eprint/86608/ Data governance cloud security checklist at infrastructure as a service (IaaS) Abu Saed, Kamariah Aziz, Norshakirah Abdulkadir, Said Jadid Hassan, Noor Hafizah A. Aziz, Izzatdin QA75 Electronic computers. Computer science Security checklist is an important element in measuring the level of computing security, especially in cloud computing. Vulnerability in cloud computing become major concern because it will lead to security issue. While security awareness and training can educate users on the severe impact of malware, implementation on data governance and security checklist also can help to reduce the risk of being attacked. Since security checklist is important element to measure security level in cloud computing, data governance can help to manage data right with correct procedure. Due to increasing threats and attacks, service providers and service consumers need to adhere to guidelines and/or checklists when measuring the security level of services and to be prepared for unforeseen circumstances, especially in the IaaS platform. As the IaaS platform lies at the lower level in cloud computing where data are stored, it is vital that IaaS security be given serious consideration to prevent not only data breaches but also data losses. The objective of this paper is to discuss the implementation of security checklist in IaaS layer. In this paper also, several studies related with security assessment and checklist that had been discussed and developed by previous researchers and professional bodies will be discussed. This paper will also discuss the result from interview session that had been conducted by the author with several data centers (DCs) and experts regarding the implementation of security measures in small cloud DCs. Science and Information Organization 2018 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/86608/1/NoorHafizahHassan2018_DataGovernanceCloudSecurityChecklist.pdf Abu Saed, Kamariah and Aziz, Norshakirah and Abdulkadir, Said Jadid and Hassan, Noor Hafizah and A. Aziz, Izzatdin (2018) Data governance cloud security checklist at infrastructure as a service (IaaS). International Journal of Advanced Computer Science and Applications, 9 (10). pp. 297-306. ISSN 2158-107X http://dx.doi.org/10.14569/IJACSA.2018.091036 DOI:10.14569/IJACSA.2018.091036 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Abu Saed, Kamariah Aziz, Norshakirah Abdulkadir, Said Jadid Hassan, Noor Hafizah A. Aziz, Izzatdin Data governance cloud security checklist at infrastructure as a service (IaaS) |
description |
Security checklist is an important element in measuring the level of computing security, especially in cloud computing. Vulnerability in cloud computing become major concern because it will lead to security issue. While security awareness and training can educate users on the severe impact of malware, implementation on data governance and security checklist also can help to reduce the risk of being attacked. Since security checklist is important element to measure security level in cloud computing, data governance can help to manage data right with correct procedure. Due to increasing threats and attacks, service providers and service consumers need to adhere to guidelines and/or checklists when measuring the security level of services and to be prepared for unforeseen circumstances, especially in the IaaS platform. As the IaaS platform lies at the lower level in cloud computing where data are stored, it is vital that IaaS security be given serious consideration to prevent not only data breaches but also data losses. The objective of this paper is to discuss the implementation of security checklist in IaaS layer. In this paper also, several studies related with security assessment and checklist that had been discussed and developed by previous researchers and professional bodies will be discussed. This paper will also discuss the result from interview session that had been conducted by the author with several data centers (DCs) and experts regarding the implementation of security measures in small cloud DCs. |
format |
Article |
author |
Abu Saed, Kamariah Aziz, Norshakirah Abdulkadir, Said Jadid Hassan, Noor Hafizah A. Aziz, Izzatdin |
author_facet |
Abu Saed, Kamariah Aziz, Norshakirah Abdulkadir, Said Jadid Hassan, Noor Hafizah A. Aziz, Izzatdin |
author_sort |
Abu Saed, Kamariah |
title |
Data governance cloud security checklist at infrastructure as a service (IaaS) |
title_short |
Data governance cloud security checklist at infrastructure as a service (IaaS) |
title_full |
Data governance cloud security checklist at infrastructure as a service (IaaS) |
title_fullStr |
Data governance cloud security checklist at infrastructure as a service (IaaS) |
title_full_unstemmed |
Data governance cloud security checklist at infrastructure as a service (IaaS) |
title_sort |
data governance cloud security checklist at infrastructure as a service (iaas) |
publisher |
Science and Information Organization |
publishDate |
2018 |
url |
http://eprints.utm.my/id/eprint/86608/1/NoorHafizahHassan2018_DataGovernanceCloudSecurityChecklist.pdf http://eprints.utm.my/id/eprint/86608/ http://dx.doi.org/10.14569/IJACSA.2018.091036 |
_version_ |
1680321070746304512 |
score |
13.211869 |