Information Security in the Cloud: Should We be Using a Different Approach?

Bob Duncan, Mark Whittington

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
23 Downloads (Pure)

Abstract

Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?
Original languageEnglish
Title of host publication2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages523-528
Number of pages6
ISBN (Electronic)978-1-4673-9560-1
ISBN (Print)978-1-4673-9561-8
DOIs
Publication statusPublished - 30 Nov 2015
Event2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) - UBC Robson Square Conference Centre, 800 Robson St, Vancouver, BC, Canada, Vancouver, Canada
Duration: 30 Nov 20153 Dec 2015
http://cipsijoomla.ux.uis.no/cloudcom2015/

Conference

Conference2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
Abbreviated titleCloudCom 2015
CountryCanada
CityVancouver
Period30/11/153/12/15
Internet address

Fingerprint

Security of data
Cloud computing
Industry

Keywords

  • security
  • privacy
  • standards
  • compliance
  • assurance
  • audit
  • measurement
  • cloud service providers
  • service level agreements
  • threat environment

Cite this

Duncan, B., & Whittington, M. (2015). Information Security in the Cloud: Should We be Using a Different Approach? In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 523-528). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CloudCom.2015.92

Information Security in the Cloud: Should We be Using a Different Approach? / Duncan, Bob; Whittington, Mark.

2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). Institute of Electrical and Electronics Engineers (IEEE), 2015. p. 523-528.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Duncan, B & Whittington, M 2015, Information Security in the Cloud: Should We be Using a Different Approach? in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). Institute of Electrical and Electronics Engineers (IEEE), pp. 523-528, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, Canada, 30/11/15. https://doi.org/10.1109/CloudCom.2015.92
Duncan B, Whittington M. Information Security in the Cloud: Should We be Using a Different Approach? In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). Institute of Electrical and Electronics Engineers (IEEE). 2015. p. 523-528 https://doi.org/10.1109/CloudCom.2015.92
Duncan, Bob ; Whittington, Mark. / Information Security in the Cloud: Should We be Using a Different Approach?. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). Institute of Electrical and Electronics Engineers (IEEE), 2015. pp. 523-528
@inproceedings{6433bd940de142ffa9cb4495a8939391,
title = "Information Security in the Cloud: Should We be Using a Different Approach?",
abstract = "Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?",
keywords = "security, privacy, standards, compliance, assurance, audit, measurement, cloud service providers, service level agreements, threat environment",
author = "Bob Duncan and Mark Whittington",
year = "2015",
month = "11",
day = "30",
doi = "10.1109/CloudCom.2015.92",
language = "English",
isbn = "978-1-4673-9561-8",
pages = "523--528",
booktitle = "2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)",
publisher = "Institute of Electrical and Electronics Engineers (IEEE)",

}

TY - GEN

T1 - Information Security in the Cloud: Should We be Using a Different Approach?

AU - Duncan, Bob

AU - Whittington, Mark

PY - 2015/11/30

Y1 - 2015/11/30

N2 - Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?

AB - Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?

KW - security

KW - privacy

KW - standards

KW - compliance

KW - assurance

KW - audit

KW - measurement

KW - cloud service providers

KW - service level agreements

KW - threat environment

U2 - 10.1109/CloudCom.2015.92

DO - 10.1109/CloudCom.2015.92

M3 - Conference contribution

SN - 978-1-4673-9561-8

SP - 523

EP - 528

BT - 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)

PB - Institute of Electrical and Electronics Engineers (IEEE)

ER -