Font Size: a A A

User Information Security Policy Research Under Cloud Computing

Posted on:2014-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:W LouFull Text:PDF
GTID:2268330401982018Subject:Information Science
Abstract/Summary:PDF Full Text Request
Cloud computing technology in the last four to five years, a wide range ofworldwide rise, the rapid development and application has brought great change to thedevelopment of modern society, a growing number of individuals, organizations andgovernment agencies to take the advanced IT services model. However, after theinitial overjoyed, more and more user information security issues for cloud computingfollowed, such as: cloud computing the ISP Amazon (Amazon) broke prehistoriclargest downtime event, Sony cloud services brokefrequent user information andpasswords leaked, Google’s G-Mail user data loss event issued a warning to us: Therapid development of cloud computing security issues should pay attention to exposed,which determines the future trends of the cloud computing industry and the rise andfall of. In this paper, the cloud computing service model, deployment patterns andphenomena of various cloud computing security issues, from technology andmanagement as well as human analysis may lead to the risk of proposed cloudcomputing service providers in the technical aspects of mana gement, you cantakecountermeasures; Information protection strategy; government and industryregulatory authorities can take the user can be taken in the use of cloud computingservices strategy; Government and industry regulatory authorities can take the strategy.Demand from the market feasibility analysis for the proposed countermeasures,implementation feasibility, economic feasibility analysis of the feasibility of variouscountermeasures and countermeasures implementation which protection is required.The innovation of this paper is a comprehensive evaluation of technical, management,human factors perspective cloud computing security issues, and increase the user’spoint of view taken measures to prevent the cloud computing security issues. Thepurpose of this article is not to propose a technical innovation, this paper aims forcloud computing development to provide new ideas for the current era cloudcomputing user information security providing a viable recommendations.
Keywords/Search Tags:cloud computing, user information, security, security countermeasures
PDF Full Text Request
Related items