earticle

논문검색

Classification of Critical Cloud Computing Security Issues for Banking Organizations : A Cloud Delphi Study

초록

영어

The aim of this study is to classify critical security issues in cloud banking organizations, according to the cloud service models (CSM), and the cloud deployment models (CDM). We classified and ranked the critical cloud security issues for banking organizations based on secondary and primary data. In this regard the cloud Delphi study is modified into three phases like identifying, analysis, and evaluating security issues. In this study, the samples of 40 panelists were selected from inside and outside Malaysian banking organizations based on their experienced in the banking environment to set the insight of the cloud issues. The study starts with a list of cloud security issues based on secondary data and interview. In addition, we illustrated the level of risk for all the cloud security issues in banking organizations as small, medium, and large risk. We also indicated that the highest risk of “Trusted cloud” in 3rd party (providers) and policies security issues and the highest risk of “Availability and Mobility” in application and program (software) security, etc. The study has been conducted on groups of cloud IT managers and cloud banking developers. As a future work, we will control and mitigate the critical security issues by using artificial intelligence techniques (ANN). A successful classification of critical cloud security issues will greatly improve the probability of cloud banking success rate.

목차

Abstract
 1. Introduction
 2. Literature Review
 3. The Concepts of Cloud Modelling for Banking Organizations
  3.1 Mobility, Banking Applications, and Web Service API
  3.2 Cloud Service Models (CSM)
  3.3 Cloud Deployment Models (CDM)
  3.4 Cloud Risk Management (CRM)
  3.5 Cloud Security Issues Models (CSIM)
 4. Classification of Critical Cloud Security Issues based on Cloud Security models in Banking Organizations
  4.1 3rd Party (Providers) and Policies Security:
  4.2 Application and Program (Software) Security Issues
  4.3 Data and Information Security Issues:
  4.4 Security Control and Network Issues
  4.5 Security and Service Management Issues
  4.6 Physical Infrastructure Security Issues
 5. Empirical Strategy (Analytic Study)
  5.1 Methods
  5.2 Data Collection
  5.3 Results and Discussion
 6. Conclusions
 Acknowledgments
 References

저자정보

  • Abdelrafe Elzamly Department of Computer Science, Al-Aqsa University, Gaza, Palestine
  • Burairah Hussin Information & Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia
  • Abd Samad Hasan Basari Information & Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.