Deployment models: Enhancing security in cloud computing environment
- 6 October 2016
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
In order to manage IT, cloud computing adoption is a successful technology for the majority of organizations to have a cost effective strategy. However, security is the major issue that decreases the growth of cloud computing [12]. This article proposes different deployment models based on different security concerns. Each model provides additional security related features to the previous models. The final model eases the security concerns and can be used as a reference model for the deployment models.Keywords
This publication has 10 references indexed in Scilit:
- Challenges and security issues in cloud computing from two perspectives: Data security and privacy protectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- An Analysis of Security Related Issues in Cloud ComputingCommunications in Computer and Information Science, 2011
- Attack Surfaces: A Taxonomy for Attacks on Cloud ServicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Deployment models: Towards eliminating security concerns from cloud computingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Controlling data in the cloudPublished by Association for Computing Machinery (ACM) ,2009
- Cloud computing architecture and application programmingACM SIGACT News, 2009
- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based CryptographyLecture Notes in Computer Science, 2009
- Data Protection-Aware Design for Cloud ServicesLecture Notes in Computer Science, 2009
- Privacy in a Semantic Cloud: What’s Trust Got to Do with It?Lecture Notes in Computer Science, 2009
- Separation of duties for access control enforcement in workflow environmentsIBM Systems Journal, 2001