Font Size: a A A

Research On Information Security Law Standard In Cloud Service Life Cycle

Posted on:2018-06-13Degree:MasterType:Thesis
Country:ChinaCandidate:G LuoFull Text:PDF
GTID:2346330521951315Subject:Books intelligence
Abstract/Summary:PDF Full Text Request
The emergence of cloud computing,which is the third change in IT industry,leads to more and more information security issues exposed at a glance.According to the survey,60% of the users are concerned of the cloud service stability and credibility,to a certain extent,which restricts the development of cloud services in-depth promotion.At present,Europe and the United States and other developed countries are strengthening policy and legal measures to solve the problem of cloud computing security,such as the United States "Federal Cloud Computing Strategy",the EU "2020 Strategy" and so on,and they also made a detailed explanation about cloud information security certification legis lation.In view of this,in the cloud service life cycle at all stages,clearing legal responsibilities and obligations of cloud service provider and the users to meet the safety certification system requirements,and formulating security laws of our country to protect the legitimate rights and interests of users.It is imperative to ensure the safe and reliab le use of cloud services for users and to promote the healthy development of cloud services.In this paper,from the perspective of legal protection,we use literature research and comparative analysis to analyze the problem of information security authentication in the who le life cycle of cloud computing services.The first chapter mainly inc ludes the background,the research purpose and the significance of the cloud service information security problem,and expounds the research status at home and abroad from the two aspects of cloud service information security authentication system and cloud service security law.The second chapter analyzes the basic concepts of cloud service,information security,information security and cloud service information security authentication,and uses cloud service life cycle theory and network security legal system to determine the research framework of this paper.The third chapter compares the Chinese and foreign information security authentication system,analyzes its specific behavior requirements of cloud service providers,and paves the way for the further study of information security legal issues.The fourth chapter analyzes the safety and responsibility of cloud service providers at all stages of cloud service life cycle,and analyzes the legal problems in each stage,and compares the similarities and differences between Chinese and foreign legislation on relevant legal issues.In the fifth chapter,through the comparison of Chinese and foreign legislation on the above jud icial issues and the present situation of our country,the author gives substantive opinions on the legislation of cloud service information security at all stages.
Keywords/Search Tags:Cloud services, Information security, Life cycle, laws and regulations
PDF Full Text Request
Related items