Session

Computer Science and Communication Engineering

Description

Cloud services offer many benefits from information and communication technology that to be credible must first be secured. To use the potential of cloud computing, data is transferred, processed and stored in the infrastructures of these service providers. This indicates that the owners of data, particularly enterprises, have puzzled when storing their data is done outside the scope of their control.

Research conducted on this topic show how this should be addressed unequivocally. The provided information on the organization of cloud computing models, services and standards, with a focus on security aspects in protecting enterprise data where emphasis shows how data access is treated with reliability from providers of these services.

The topic turns to key security issues that companies should consider when they select the cloud service provider. Case studies from this research gives the fulfillment of these key security points from the providers of these services.

Keywords:

AWS, EC2, IaaS, IEEE, ISO, NIST, PaaS, SaaS, SAS, SLA, SSL, TLS

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-46-2

First Page

88

Last Page

96

Location

Durres, Albania

Start Date

28-10-2016 9:00 AM

End Date

30-10-2016 5:00 PM

DOI

10.33107/ubt-ic.2016.56

Share

COinS
 
Oct 28th, 9:00 AM Oct 30th, 5:00 PM

Cloud Computing and Enterprise Data Reliability

Durres, Albania

Cloud services offer many benefits from information and communication technology that to be credible must first be secured. To use the potential of cloud computing, data is transferred, processed and stored in the infrastructures of these service providers. This indicates that the owners of data, particularly enterprises, have puzzled when storing their data is done outside the scope of their control.

Research conducted on this topic show how this should be addressed unequivocally. The provided information on the organization of cloud computing models, services and standards, with a focus on security aspects in protecting enterprise data where emphasis shows how data access is treated with reliability from providers of these services.

The topic turns to key security issues that companies should consider when they select the cloud service provider. Case studies from this research gives the fulfillment of these key security points from the providers of these services.