TY - GEN
T1 - The need, use and efficiency of trustworthy security model in Cloud computing for information assurance
AU - Bhamidipati, Kishore
AU - Karanth Shyam, S.
PY - 2012/12/1
Y1 - 2012/12/1
N2 - The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems
AB - The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems
UR - https://www.scopus.com/pages/publications/84876005781
UR - https://www.scopus.com/inward/citedby.url?scp=84876005781&partnerID=8YFLogxK
U2 - 10.1109/ICCCTAM.2012.6488074
DO - 10.1109/ICCCTAM.2012.6488074
M3 - Conference contribution
AN - SCOPUS:84876005781
SN - 9781467344166
T3 - Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
SP - 69
EP - 73
BT - Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
T2 - 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
Y2 - 8 December 2012 through 10 December 2012
ER -