Mitigation for cloud computing security risks and governance Online publication date: Thu, 02-Feb-2023
by J. Jabez; R. Narmadha; S. Porkodi; L. Devi
International Journal of Cloud Computing (IJCC), Vol. 11, No. 5/6, 2022
Abstract: The recent prosperous of cloud computing has become the biggest revenue for originalities with the issues of intricate servers that need regular maintenance, security, power and cooling systems throughout. Hence, it is extremely significant for any cloud service earner is to offer dense security models and policies to all users involves. Although creating best suited security strategies might necessitate enormous amount of reserve and endurance, it will bounce the casual for end user to relay on a computerised security system throughout. The cloud environs supplementary strongly secure, qualifying security hazards, appropriate controls must be imposed. Major contest is to consider cloud security and governance explanation together. In this segment, the emphasis will be in the contests involved in preserving a dependable security policy computerisation in at the application layer, network layer and host level of cloud computing. Moreover, securities related to models will be discussed to recruit for those security applications which are more composite and active.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com