Cloud Technology: Opportunities for Cybercriminals and Security Challenges

Leo Willyanto Santoso
{"title":"Cloud Technology: Opportunities for Cybercriminals and Security Challenges","authors":"Leo Willyanto Santoso","doi":"10.1109/Ubi-Media.2019.00013","DOIUrl":null,"url":null,"abstract":"Nowadays, there is a growing of interest about cloud technology to many companies around the world. That's why many companies trying and implementing cloud computing technologies in their business processes. This research will examine the security requirements that will apply for companies and organizations when they choose to move to a cloud service solution. The study is carried out because cloud services are very desirable in many industries today. Migrating to cloud services would often results in great benefits both financially and administratively. The concerns raised by the transition are how security should be handled. Many companies suffer from a lack of knowledge and it is seen as a big risk to make the transition. This leads to the question that the research strive to answer - which security demands will the transition to a cloud service implicate? In this paper we explain which security requirements are available both for local solutions and cloud solutions. We draw conclusions about what differences there are, what requirements are mutual, which ones are new and which ones are absent if a transition is made to cloud services. The result of this research is an evaluation that companies and organizations can use as a basis when they plan to implement this particular transition.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Ubi-Media.2019.00013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Nowadays, there is a growing of interest about cloud technology to many companies around the world. That's why many companies trying and implementing cloud computing technologies in their business processes. This research will examine the security requirements that will apply for companies and organizations when they choose to move to a cloud service solution. The study is carried out because cloud services are very desirable in many industries today. Migrating to cloud services would often results in great benefits both financially and administratively. The concerns raised by the transition are how security should be handled. Many companies suffer from a lack of knowledge and it is seen as a big risk to make the transition. This leads to the question that the research strive to answer - which security demands will the transition to a cloud service implicate? In this paper we explain which security requirements are available both for local solutions and cloud solutions. We draw conclusions about what differences there are, what requirements are mutual, which ones are new and which ones are absent if a transition is made to cloud services. The result of this research is an evaluation that companies and organizations can use as a basis when they plan to implement this particular transition.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云技术:网络罪犯的机会和安全挑战
如今,世界各地的许多公司对云技术越来越感兴趣。这就是为什么许多公司尝试在其业务流程中实现云计算技术的原因。本研究将检查公司和组织在选择迁移到云服务解决方案时将适用的安全要求。之所以进行这项研究,是因为当今许多行业都非常需要云服务。迁移到云服务通常会在财务和管理上带来巨大的好处。过渡引起的关注是如何处理安全问题。许多公司都存在知识匮乏的问题,这被视为转型的一大风险。这就引出了该研究试图回答的问题——向云服务的过渡意味着哪些安全需求?在本文中,我们将解释哪些安全需求可用于本地解决方案和云解决方案。我们得出结论:如果向云服务过渡,存在哪些差异,哪些需求是相互的,哪些是新的,哪些是不存在的。这项研究的结果是一个评估,当公司和组织计划实施这一特定的转变时,可以将其作为基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Target-Monitoring Learning Companion Design DeepBonds: A Deep Learning Approach to Predicting United States Treasury Yield Clinically Applicable Deep Learning for Diagnosis of Diabetic Retinopathy Markerless Indoor/Outdoor Augmented Reality Navigation Device Based on ORB-Visual-Odometry Positioning Estimation and Wall-Floor-Boundary Image Registration [Copyright notice]
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1