Session
Computer Science and Communication Engineering
Description
Cloud services offer many benefits from information and communication technology that to be credible must first be secured. To use the potential of cloud computing, data is transferred, processed and stored in the infrastructures of these service providers. This indicates that the owners of data, particularly enterprises, have puzzled when storing their data is done outside the scope of their control.
Research conducted on this topic show how this should be addressed unequivocally. The provided information on the organization of cloud computing models, services and standards, with a focus on security aspects in protecting enterprise data where emphasis shows how data access is treated with reliability from providers of these services.
The topic turns to key security issues that companies should consider when they select the cloud service provider. Case studies from this research gives the fulfillment of these key security points from the providers of these services.
Keywords:
AWS, EC2, IaaS, IEEE, ISO, NIST, PaaS, SaaS, SAS, SLA, SSL, TLS
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-437-46-2
First Page
88
Last Page
96
Location
Durres, Albania
Start Date
28-10-2016 9:00 AM
End Date
30-10-2016 5:00 PM
DOI
10.33107/ubt-ic.2016.56
Recommended Citation
Gashi, Luan, "Cloud Computing and Enterprise Data Reliability" (2016). UBT International Conference. 56.
https://knowledgecenter.ubt-uni.net/conference/2016/all-events/56
Included in
Cloud Computing and Enterprise Data Reliability
Durres, Albania
Cloud services offer many benefits from information and communication technology that to be credible must first be secured. To use the potential of cloud computing, data is transferred, processed and stored in the infrastructures of these service providers. This indicates that the owners of data, particularly enterprises, have puzzled when storing their data is done outside the scope of their control.
Research conducted on this topic show how this should be addressed unequivocally. The provided information on the organization of cloud computing models, services and standards, with a focus on security aspects in protecting enterprise data where emphasis shows how data access is treated with reliability from providers of these services.
The topic turns to key security issues that companies should consider when they select the cloud service provider. Case studies from this research gives the fulfillment of these key security points from the providers of these services.