원문정보
초록
영어
The aim of this study is to classify critical security issues in cloud banking organizations, according to the cloud service models (CSM), and the cloud deployment models (CDM). We classified and ranked the critical cloud security issues for banking organizations based on secondary and primary data. In this regard the cloud Delphi study is modified into three phases like identifying, analysis, and evaluating security issues. In this study, the samples of 40 panelists were selected from inside and outside Malaysian banking organizations based on their experienced in the banking environment to set the insight of the cloud issues. The study starts with a list of cloud security issues based on secondary data and interview. In addition, we illustrated the level of risk for all the cloud security issues in banking organizations as small, medium, and large risk. We also indicated that the highest risk of “Trusted cloud” in 3rd party (providers) and policies security issues and the highest risk of “Availability and Mobility” in application and program (software) security, etc. The study has been conducted on groups of cloud IT managers and cloud banking developers. As a future work, we will control and mitigate the critical security issues by using artificial intelligence techniques (ANN). A successful classification of critical cloud security issues will greatly improve the probability of cloud banking success rate.
목차
1. Introduction
2. Literature Review
3. The Concepts of Cloud Modelling for Banking Organizations
3.1 Mobility, Banking Applications, and Web Service API
3.2 Cloud Service Models (CSM)
3.3 Cloud Deployment Models (CDM)
3.4 Cloud Risk Management (CRM)
3.5 Cloud Security Issues Models (CSIM)
4. Classification of Critical Cloud Security Issues based on Cloud Security models in Banking Organizations
4.1 3rd Party (Providers) and Policies Security:
4.2 Application and Program (Software) Security Issues
4.3 Data and Information Security Issues:
4.4 Security Control and Network Issues
4.5 Security and Service Management Issues
4.6 Physical Infrastructure Security Issues
5. Empirical Strategy (Analytic Study)
5.1 Methods
5.2 Data Collection
5.3 Results and Discussion
6. Conclusions
Acknowledgments
References