The need, use and efficiency of trustworthy security model in Cloud computing for information assurance

Kishore Bhamidipati, S. Karanth Shyam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned 'on demand', regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the 'best of both worlds', providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for 'security' in cloud-based systems

Original languageEnglish
Title of host publicationProceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
Pages69-73
Number of pages5
DOIs
Publication statusPublished - 01-12-2012
Externally publishedYes
Event2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 - Dubai, United Arab Emirates
Duration: 08-12-201210-12-2012

Conference

Conference2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
CountryUnited Arab Emirates
CityDubai
Period08-12-1210-12-12

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Software

Fingerprint Dive into the research topics of 'The need, use and efficiency of trustworthy security model in Cloud computing for information assurance'. Together they form a unique fingerprint.

  • Cite this

    Bhamidipati, K., & Karanth Shyam, S. (2012). The need, use and efficiency of trustworthy security model in Cloud computing for information assurance. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (pp. 69-73). [6488074] https://doi.org/10.1109/ICCCTAM.2012.6488074