The need, use and efficiency of trustworthy security model in Cloud computing for information assurance

Kishore Bhamidipati, S. Karanth Shyam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems

Original languageEnglish
Title of host publicationProceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
Pages69-73
Number of pages5
DOIs
Publication statusPublished - 01-12-2012
Externally publishedYes
Event2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 - Dubai, United Arab Emirates
Duration: 08-12-201210-12-2012

Conference

Conference2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
CountryUnited Arab Emirates
CityDubai
Period08-12-1210-12-12

Fingerprint

Cloud computing
Industry
Outsourcing
Availability
Internet
Costs

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Software

Cite this

Bhamidipati, K., & Karanth Shyam, S. (2012). The need, use and efficiency of trustworthy security model in Cloud computing for information assurance. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (pp. 69-73). [6488074] https://doi.org/10.1109/ICCCTAM.2012.6488074
Bhamidipati, Kishore ; Karanth Shyam, S. / The need, use and efficiency of trustworthy security model in Cloud computing for information assurance. Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012. 2012. pp. 69-73
@inproceedings{bcb9fade8bd4478cae12686a679eeee2,
title = "The need, use and efficiency of trustworthy security model in Cloud computing for information assurance",
abstract = "The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems",
author = "Kishore Bhamidipati and {Karanth Shyam}, S.",
year = "2012",
month = "12",
day = "1",
doi = "10.1109/ICCCTAM.2012.6488074",
language = "English",
isbn = "9781467344166",
pages = "69--73",
booktitle = "Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012",

}

Bhamidipati, K & Karanth Shyam, S 2012, The need, use and efficiency of trustworthy security model in Cloud computing for information assurance. in Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012., 6488074, pp. 69-73, 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012, Dubai, United Arab Emirates, 08-12-12. https://doi.org/10.1109/ICCCTAM.2012.6488074

The need, use and efficiency of trustworthy security model in Cloud computing for information assurance. / Bhamidipati, Kishore; Karanth Shyam, S.

Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012. 2012. p. 69-73 6488074.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - The need, use and efficiency of trustworthy security model in Cloud computing for information assurance

AU - Bhamidipati, Kishore

AU - Karanth Shyam, S.

PY - 2012/12/1

Y1 - 2012/12/1

N2 - The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems

AB - The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems

UR - http://www.scopus.com/inward/record.url?scp=84876005781&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84876005781&partnerID=8YFLogxK

U2 - 10.1109/ICCCTAM.2012.6488074

DO - 10.1109/ICCCTAM.2012.6488074

M3 - Conference contribution

AN - SCOPUS:84876005781

SN - 9781467344166

SP - 69

EP - 73

BT - Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012

ER -

Bhamidipati K, Karanth Shyam S. The need, use and efficiency of trustworthy security model in Cloud computing for information assurance. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012. 2012. p. 69-73. 6488074 https://doi.org/10.1109/ICCCTAM.2012.6488074