Security policies and trust issues in cloud computing
by Vemuri Sudarsan Rao
International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 5, No. 3, 2023

Abstract: The focus on cloud security principles, as well as the support provided by cloud specialists within an enterprise, is essential for cloud service clients. Adopting key security approaches and guidelines offers various benefits such as promoting interoperability, preventing client lock-in, and simplifying transitions. These policy norms ensure that basic accepted procedures are being followed by both the enterprise and cloud specialist organisations, and certifications are available for certain principles. These guidelines also provide a way for cloud service clients to evaluate cloud service providers. This paper focuses on the trust and security policies in a distributed computing environment, as well as the various open discussion issues such as trusted execution environment, remote access, collusion threat, data privacy, and endpoint identification.

Online publication date: Mon, 19-Jun-2023

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information Privacy, Security and Integrity (IJIPSI):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com