On Making Cloud More Secure and Trustworthy
DOI:
https://doi.org/10.46243/jst.2022.v7.i05.pp148-159Keywords:
Cloud Architecture, Cloud Security, Hybrid Cloud, Zero Trust Model, Cloud Security Design PrinciplesAbstract
Cloud computing has grown in popularity as a result of recent advancements in technology. Academics and businesses alike place a high value on computing because of the abundance of data and the emergence of new AI paradigms. The problems of scalability and availability were quickly solved by cloud computing. However difficult it has been, cloud service providers have managed to provide low-cost options. Although servers may delete rarely viewed files to save space, certain cloud firms protect data integrity. However, they can't control server and network difficulties, thus they can't guarantee data availability. Customer data integrity, availability and exposure are feared by customers. Amazon S3 and Amazon EC2, Gmail email deletion, and the Sidekick cloud disaster validated customers' concerns. – Amazon.com A customer's primary concern is the safety of their personal information. Trust and security are handled by cloud companies. Proof and data are difficult to obtain. This paper describes the security principles and security measures of the cloud environments and presents some of the security assessment criteria based upon the deployment aspects of the cloud based application services in the autonomous environment.