Font Size: a A A

Study Of Strategy Of Monitoring And Management For Data Security And Privacy Of Cloud Computing Users

Posted on:2014-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:J W WangFull Text:PDF
GTID:2298330467963609Subject:Business administration
Abstract/Summary:PDF Full Text Request
In March2011China government released its12th Five Year Plan, which puts forward the plan of building the high bandwidth, convergence, secure and comprehensive next generation information infrastructure. It’s very important to develop the next generation information technology, such as the cloud computing with the goal of achieving12th Five Year Plan and boost the Gross Demestic Product of China. Cloud computing brings us a very serious security problem. The study of this paper will firstly analyze the cloud computing industy and then research the motivation and behavior of individule cloud users, and finally give suggestions on how to protect data security and privacy. Information security is a study on how to protect the confidentiality, integrity, usability and controllability of user’s data.Information security is restricted by many factors like politics, ecomonic, law, socioty and technology. Many colleges and organizions in the world have been working on this project such as Cloud Computing Alliance who pointed out the10top potential risks for Cloud Computing and Big Data Applications. Many countries have released information security act like Privacy Act of USA, Electrical Netwrok Information Security Act and Japan’s Information Security Instructions. Strategy of managing and monitoring for cloud computing applications for individul users is a crucial project for China since China has the most volume of cloud users. Individual users’ information is a very valuble resource for a counttry. Cloud computing is casuing the valuabel information flow to high technology enterprises. Cloud computing industry is growing very fast howerver data security is the corner stone of this new technology.
Keywords/Search Tags:Cloud computing, Information security, General users, Strategy ofInformation Security
PDF Full Text Request
Related items