Cloud

Investigation of It Auditing and Checklist Generation Approach to Assure a Secure Cloud Computing Framework

Download Now Free registration required

Executive Summary

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However, there are still some concerns about the security provided by the cloud environment are raises. In this paper, the authors are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, they are implementing working of ID auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models.

  • Format: PDF
  • Size: 937 KB