Data Privacy & Encryption Practices in Cloud-Based Guidewire Deployments

Authors

  • Gowtham Reddy Enjam Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I3P108

Keywords:

Cloud Security, Guidewire, DevSecOps, Data Privacy, Encryption, Insurance Technology, Cloud Deployment, Compliance

Abstract

The way businesses are operated has changed with cloud services, in regard to scalability, dynamism and affordability. Guidewire is an insurance platform which is a cloud based system that has tremendously changed the insurance industry especially when it comes to digital transformation. However, the reality that insurance data, along with PII, financial records and health-related data is quite sensitive brings with it some substantial security and privacy risks. The data privacy and encryption processes which are the precondition to achieving cyber resiliency in the cloud-based integration of Guidewire, trends of cloud security, introduction of DevOps into Cloud will be discussed in the paper. We take into account a comprehensive discussion on encryption requirements, privacy protecting technologies, regulatory requirement and method applied to enhance resilience against cyber threats. Moreover, we speak about real-life implementation of DevSecOps pipes, autogenerated compliance verification and encryption at rest and in transit. The literature review, methodology proposal, and result analysis indicate that some major steps are presented in data integrity, confidentiality, and compliance when an insurer relies on Guidewire in the cloud-based environment

References

1. Acar, A., Aksu, H., Uluagac, A. S., & Conti, M. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur), 51(4), 1-35.

2. El-Yahyaoui, A., & ECH-CHERIF EL KETTANI, M. D. (2019). A verifiable fully homomorphic encryption scheme for cloud computing security. Technologies, 7(1), 21.

3. Gahi, Y., Guennoun, M., & El-Khatib, K. (2015). A secure database system using homomorphic encryption schemes. arXiv preprint arXiv:1512.03498.

4. Mohanta, B. K., &Gountia, D. (2013). Fully homomorphic encryption equating to cloud security: an approach. IOSR Journal of Computer Engineering (IOSR-JCE), 9(2), 46-50.

5. Jung, T., Li, X.-Y., Wan, Z., & Wan, M. (2012). AnonyControl: Control Cloud Data Anonymously with Multi Authority Attribute Based Encryption.

6. Gaur, T. & Sharma, D. (2016). A Secure and Efficient Client Side Encryption Scheme in Cloud Computing. International Journal of Wireless and Microwave Technologies.

7. McCallister, E. (2010). Guide to protecting the confidentiality of personally identifiable information. Diane Publishing.

8. Barrese, J., Lai, G. C., &Scordis, N. (2009). A measure of the stringency of state insurance regulation. Journal of Insurance Regulation, 27(2), 21-40.

9. Klein, R. W. (2009). The insurance industry and its regulation: an overview. The future of insurance regulation in the United States, 13, 28.

10. Ghorbel, A., Ghorbel, M., &Jmaiel, M. (2017). Privacy in cloud computing environments: a survey and research challenges. The Journal of Supercomputing, 73(6), 2763-2800.

11. Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903.

12. Ray, C., &Ganguly, U. (2011, September). An approach for data privacy in hybrid cloud environment. In 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011) (pp. 316-320). IEEE.

13. Riaz, S., Khan, A. H., Haroon, M., Latif, S., &Bhatti, S. (2020, August). Big data security and privacy: Current challenges and future research perspective in cloud environment. In 2020 International Conference on Information Management and Technology (ICIMTech) (pp. 977-982). IEEE.

14. Sun, P. J. (2019). Privacy protection and data security in cloud computing: a survey, challenges, and solutions. Ieee Access, 7, 147420-147452.

15. Singh, N., & Singh, A. K. (2018). Data privacy protection mechanisms in cloud. Data Science and Engineering, 3(1), 24-39.

16. Prasanna, B. T. & Akki, C. B. (2015). A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing.

17. Moghadam, S., Darmont, J., & Gavin, G. (2017). S4: A New Secure Scheme for Enforcing Privacy in Cloud Data Warehouses.

18. Hsu, T. H. C. (2018). Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps. Packt Publishing Ltd.

19. Ahmed, Z., & Francis, S. C. (2019, November). Integrating security with devsecops: Techniques and challenges. In 2019 International Conference on Digitization (ICD) (pp. 178-182). IEEE.

20. Davis, E. (2018). DevSecOps: Integrating Security into DevOps Practices for Enhanced Software Development. International Journal of Artificial Intelligence and Machine Learning, 1(2).

21. Pappula, K. K. (2020). Browser-Based Parametric Modeling: Bridging Web Technologies with CAD Kernels. International Journal of Emerging Trends in Computer Science and Information Technology, 1(3), 56-67. https://doi.org/10.63282/3050-9246.IJETCSIT-V1I3P107

22. Rahul, N. (2020). Optimizing Claims Reserves and Payments with AI: Predictive Models for Financial Accuracy. International Journal of Emerging Trends in Computer Science and Information Technology, 1(3), 46-55. https://doi.org/10.63282/3050-9246.IJETCSIT-V1I3P106

Downloads

Published

2021-10-30

Issue

Section

Articles

How to Cite

1.
Enjam GR. Data Privacy & Encryption Practices in Cloud-Based Guidewire Deployments. IJAIBDCMS [Internet]. 2021 Oct. 30 [cited 2025 Sep. 13];2(3):64-73. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/230