On Making Cloud More Secure and Trustworthy

Authors

  • Tanmaya Kumar Das
  • Sasmita Mishra
  • Hari Narayan Pratihari

DOI:

https://doi.org/10.46243/jst.2022.v7.i05.pp148-159

Keywords:

Cloud Architecture, Cloud Security, Hybrid Cloud, Zero Trust Model, Cloud Security Design Principles

Abstract

Cloud computing has grown in popularity as a result of recent advancements in technology. Academics and businesses alike place a high value on computing because of the abundance of data and the emergence of new AI paradigms. The problems of scalability and availability were quickly solved by cloud computing. However difficult it has been, cloud service providers have managed to provide low-cost options. Although servers may delete rarely viewed files to save space, certain cloud firms protect data integrity. However, they can't control server and network difficulties, thus they can't guarantee data availability. Customer data integrity, availability and exposure are feared by customers. Amazon S3 and Amazon EC2, Gmail email deletion, and the Sidekick cloud disaster validated customers' concerns. – Amazon.com A customer's primary concern is the safety of their personal information. Trust and security are handled by cloud companies. Proof and data are difficult to obtain. This paper describes the security principles and security measures of the cloud environments and presents some of the security assessment criteria based upon the deployment aspects of the cloud based application services in the autonomous environment.

Downloads

Published

2022-07-30

How to Cite

Das, T. K., Mishra, S., & Pratihari, H. N. (2022). On Making Cloud More Secure and Trustworthy. Journal of Science & Technology (JST), 7(5), 148–159. https://doi.org/10.46243/jst.2022.v7.i05.pp148-159

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.