Managing and Performing Secure Transactions on Cloud Data

Cloud computing involves application systems which are executed within the cloud and operated through internet enabled devices. Purely cloud computing does not rely on the use of cloud storage as it will be removed upon users download action. Clouds can be classified as public, private and hybrid. For transactions to be secure, the authors need to address various constraints from an end-user and cloud service provider’s point of view. The end-user is primarily concerned with the provider’s security policy, how and where their data is stored and who has access to that data. On the other hand, concerns for the cloud service provider can range from the physical security of the infrastructure and the access control mechanism of cloud assets, to the execution and maintenance of security policy.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Provided by:
International Journal & Magazine of Engineering, Technology, Management And Research (IJMETMR)
Topic:
Cloud
Format:
PDF