The need, use and efficiency of trustworthy security model in Cloud computing for information assurance

K. Bhamidipati, S. Karanth Shyam
{"title":"The need, use and efficiency of trustworthy security model in Cloud computing for information assurance","authors":"K. Bhamidipati, S. Karanth Shyam","doi":"10.1109/ICCCTAM.2012.6488074","DOIUrl":null,"url":null,"abstract":"The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned “on demand”, regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the “best of both worlds”, providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for “security” in cloud-based systems.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCTAM.2012.6488074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned “on demand”, regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the “best of both worlds”, providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for “security” in cloud-based systems.
可信安全模型在云计算中对信息保障的需求、使用和效率
云计算帮助企业实现业务和技术的转型。它在成本上是有效的,灵活的,并且它是一个经过验证的交付平台,用于通过Internet提供业务或消费者It服务。云资源可以很容易地扩展和快速部署,“按需”提供所有服务、应用程序和流程,而不考虑用户或设备的位置。因此,云计算使组织有机会提高服务交付的效率,简化IT管理,并根据动态业务需求更好地调整IT服务。在许多方面,云计算提供了“两全其美”,既为核心业务功能提供了良好的支持,又具有开发新的创新服务的能力。除了开发安全IT系统的常见挑战外,云计算还带来了额外的风险,因为基本服务通常外包给第三方。外包的这一方面使得维护数据完整性和隐私、支持数据和服务可用性以及证明合规性变得困难。这项研究包括对基于云的系统中“安全”的实施结构和保证条款的调查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信