Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment

Haifaa Jassim Muhasin, Rodziah Atan, Marzanah A.Jabar, Salfarina Abdullah, Shahreen Kasim

Abstract


The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.   


Keywords


cloud computing; privacy; security; confidentiality; integrity; availability

Full Text:

PDF

References


Kumar S, Vajpayee A. A Survey on Secure Cloud: Security and Privacy in Cloud Computing. Am J Syst [Internet]. 2016 [cited 2017 Jun 24]; Available from: http://pubs.sciepub.com/ajss/4/1/2/

Choi C, Choi J, Kim P. Ontology-based access control model for security policy reasoning in cloud computing. J Supercomput [Internet]. 2014 [cited 2017 Jun 24]; Available from: http://link.springer.com/article/10.1007/s11227-013-0980-1

Zissis D, Lekkas D. Addressing cloud computing security issues. Futur Gener Comput Syst [Internet]. 2012 [cited 2017 Jun 24]; Available from: http://www.sciencedirect.com/science/article/pii/S0167739X10002554

Tebaa M, Hajji S. From Single to Multi-clouds Computing Privacy and Fault Tolerance. IERI Procedia [Internet]. 2014 [cited 2017 Jun 24]; Available from: http://www.sciencedirect.com/science/article/pii/S2212667814001476

Wang Z. Security and privacy issues within the Cloud Computing. Inf Sci (ICCIS), 2011 Int … [Internet]. 2011 [cited 2017 Jun 24]; Available from: http://ieeexplore.ieee.org/abstract/document/6086163/

Loganayagi B, Sujatha S. Enhanced cloud security by combining virtualization and policy monitoring techniques. Procedia Eng [Internet]. 2012 [cited 2017 Jun 24]; Available from: http://www.sciencedirect.com/science/article/pii/S1877705812009216

Xiaoping X, Junhu Y. Research on cloud computing security platform. Comput Inf Sci [Internet]. 2012 [cited 2017 Jun 24]; Available from: http://ieeexplore.ieee.org/abstract/document/6300744/

Cheng F, Lai W. The impact of cloud computing technology on legal infrastructure within internet—focusing on the protection of information privacy. Procedia Eng [Internet]. 2012 [cited 2017 Jun 24]; Available from: http://www.sciencedirect.com/science/article/pii/S1877705811065386

Xu L, Cao X, Zhang Y, Wu W. Software Service Signature (S3) for authentication in cloud computing. Cluster Comput [Internet]. 2013 [cited 2017 Jun 24]; Available from: http://link.springer.com/article/10.1007/s10586-013-0262-y

Zhou M. Data security and integrity in cloud computing. University of Wollongong Thesis Collection. 2013.

Daniel W. Challenges on privacy and reliability in cloud computing security. Inf Sci Electron Electr [Internet]. 2014 [cited 2017 Jun 24]; Available from: http://ieeexplore.ieee.org/abstract/document/6947857/

Al-Anzi F, Yadav S, Soni J. Cloud computing: Security model comprising governance, risk management and compliance. Data Min Intell [Internet]. 2014 [cited 2017 Jun 24]; Available from: http://ieeexplore.ieee.org/abstract/document/6954232/

AlZain M, Soh B, Pardede E. A new model to ensure security in cloud computing services. J Serv Sci Res [Internet]. 2012 [cited 2017 Jun 24]; Available from: http://www.springerlink.com/index/F37003R856QP8656.pdf

Jogdand R, Goudar R, Sayed G, Dhamanekar P. Enabling public verifiability and availability for secure data storage in cloud computing. Evol Syst [Internet]. 2015 [cited 2017 Jun 24]; Available from: http://link.springer.com/article/10.1007/s12530-013-9095-4

Li W, Ping L, Pan X. Use trust management module to achieve effective security mechanisms in cloud environment. Electron Inf Eng ( [Internet]. 2010 [cited 2017 Jun 24]; Available from: http://ieeexplore.ieee.org/abstract/document/5559829/

Muhasin H, Atan R. Cloud computing sensitive data protection using multi layered approach. Sci Inf [Internet]. 2016 [cited 2017 Jun 24]; Available from: http://ieeexplore.ieee.org/abstract/document/7852610/

Likert R. A technique for the measurement of attitudes. Arch Psychol [Internet]. 1932 [cited 2017 Jun 25]; Available from: http://psycnet.apa.org/psycinfo/1933-01885-001

Gorondutse A, Hilman H. The influence of Business Social Responsibility (BSR) on Organizational Performances: A pilot Study. Int J Bus [Internet]. 2012 [cited 2017 Jun 25]; Available from: https://www.researchgate.net/profile/Abdullahi_Hassan_Gorondutse/publication/274138061_The_Influence_of_Business_Social_Responsibility_(BSR)_on_Organizational_Performances_A_Pilot_Study/links/5516eeef0cf2f7d80a39d219.pdf

Hair J, Anderson R, Babin B, Black W. Multivariate data analysis: A global perspective. 2010 [cited 2017 Jun 25]; Available from: http://library.wur.nl/WebQuery/clc/1924429

Sekaran U, Bougie R. Research methods for business: A skill building approach [Internet]. 2016 [cited 2017 Jun 25]. Available from: https://books.google.com/books?hl=en&lr=&id=Ko6bCgAAQBAJ&oi=fnd&pg=PA19&dq=Sekaran+U,+Bougie+R.+Research+methods+for+business:+A+skill+building+approaches+(5th+ed.).+Chichester:+John+Willey+%26+Sons+Ltd.,+2010.&ots=2A6TW0L-mQ&sig=IfaeTzx9PvofmNuF3CEXTx4NoTE

Vogt W. Quantitative research methods for professionals. 2007 [cited 2017 Jun 25]; Available from: https://scholar.google.com/scholar?q=Vogt%2C+W.+P.+Quantitative+research+methods+for+professionals.+Boston%2C+MA%3A+Pearson+Education%2C+Inc.%2C+2007&btnG=&hl=en&as_sdt=0%2C5

Wikman A. Reliability, validity and true values in surveys. Soc Indic Res [Internet]. 2006 [cited 2017 Jun 25]; Available from: http://www.springerlink.com/index/K67014H37778685X.pdf

Soja P. Examining the conditions of ERP implementations: lessons learnt from adopters. Bus Process Manag J [Internet]. 2008 [cited 2017 Jun 25]; Available from: http://www.emeraldinsight.com/doi/pdf/10.1108/14637150810849445

Walpole R, Myers R, Myers S, Ye K. Probability and statistics for engineers and scientists [Internet]. 1993 [cited 2017 Jun 25]. Available from: http://imse.statler.wvu.edu/files/d/9656f528-f87e-4d33-94bf-1fb7c10f0e38/ieng213.pdf


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com
              fazrolpnp@gmail.com


Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats