Protection of personal information in the South African Cloud Computing environment: A framework for Cloud Computing adoption

被引:0
作者
Skolmen, Dayne Edward [1 ]
Gerber, Mariana [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, Sch Informat & Commun Technol, Port Elizabeth, South Africa
来源
2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE | 2015年
关键词
cloud computing; POPI; cloud adoption; trust; information security legislation; information security; privacy; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organizations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organizations are hesitant to adopt Cloud solutions due to a variety of inhibiting factors and concerns that lead to the mistrust in Cloud Computing. One of the major concerns identified is information security within the Cloud Computing environment. The approaching commencement of new information security legislation in South Africa, known as the Protection of Personal Information Act (POPI), may provide an ideal opportunity to address the information security-related concerns and foster a trust relationship between potential Cloud users and Cloud providers. POPI applies to anyone who processes personal information and regulates how they must handle, store and secure that information. Cloud providers who can demonstrate that they protect personal information may be more trustworthy and therefore more attractive to potential Cloud users. This paper discusses a proposed Framework for Cloud Computing Adoption which could assist South African Cloud providers in approaching compliance with the POPI Act, providing transparency and accountability to potential Cloud users, fostering a trust relationship and ultimately promoting the adoption of Cloud Computing in South Africa.
引用
收藏
页数:10
相关论文
共 42 条
[1]   Safeguarding consumers against identity-related fraud: examining data breach notification legislation through the lens of routine activities theory [J].
Anandarajan, Murugan ;
D'Ovidio, Rob ;
Jenkins, Alexander .
INTERNATIONAL DATA PRIVACY LAW, 2013, 3 (01) :51-60
[2]  
[Anonymous], 2009, NIST DEFINITION CLOU
[3]  
[Anonymous], 2013, J EC BUSINESS MANAGE
[4]  
[Anonymous], 2013, 270022013 ISOIEC
[5]  
[Anonymous], 2014, S AFRICAN ENTERPRISE
[6]  
Bassett L., 2012, JUSTICE TODAY, P08
[7]  
Bourne V., 2010, 2010 GLOBAL IT LEADE
[8]  
Carlin Sean., 2012, International Journal of Cloud Computing and Services Science (IJ-CLOSER), V1, P59, DOI DOI 10.11591/CLOSER.V1I2.486
[9]  
Carroll M., 2014, CLOUD COMPUTING PPI
[10]  
Carroll M, 2010, ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 1: DATABASES AND INFORMATION SYSTEMS INTEGRATION, P214