The Need, Use and Efficiency of Trustworthy Security Model in Cloud Computing for Information Assurance

Kishore, B and Karanth, Shyam S (2012) The Need, Use and Efficiency of Trustworthy Security Model in Cloud Computing for Information Assurance. In: International Conference on Cloud Computing, Technologies, Applications and Management (ICCCTAM – 12), Dec 2012, BITS Pilani, Dubai Campus.

[img] PDF
KB_ICCCTAM.pdf - Published Version
Restricted to Registered users only

Download (996kB) | Request a copy


The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it’s a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned "on demand", regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the "best of both worlds", providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for “security” in cloud-based systems.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Security, trustworthy, compliance, information assurance, authentication, integrity, privacy
Subjects: Engineering > MIT Manipal > Computer Science and Engineering
Depositing User: MIT Library
Date Deposited: 23 Mar 2013 11:21
Last Modified: 16 May 2017 06:39

Actions (login required)

View Item View Item