Information Security in the Cloud: Should We be Using a Different Approach?

Bob Duncan, Mark Whittington

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

4 Citations (Scopus)
116 Downloads (Pure)

Abstract

Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?
Original languageEnglish
Title of host publication2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages523-528
Number of pages6
ISBN (Electronic)978-1-4673-9560-1
ISBN (Print)978-1-4673-9561-8
DOIs
Publication statusPublished - 30 Nov 2015
Event2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) - UBC Robson Square Conference Centre, 800 Robson St, Vancouver, BC, Canada, Vancouver, Canada
Duration: 30 Nov 20153 Dec 2015
http://cipsijoomla.ux.uis.no/cloudcom2015/

Conference

Conference2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
Abbreviated titleCloudCom 2015
Country/TerritoryCanada
CityVancouver
Period30/11/153/12/15
Internet address

Keywords

  • security
  • privacy
  • standards
  • compliance
  • assurance
  • audit
  • measurement
  • cloud service providers
  • service level agreements
  • threat environment

Fingerprint

Dive into the research topics of 'Information Security in the Cloud: Should We be Using a Different Approach?'. Together they form a unique fingerprint.

Cite this