Abstract

The scope of this work presents the security architecture of the Cloud provider/consumer and showcases how “Cryptography” augments the Zero Trust Architecture security strategy. In addition, this work will delve into enforcing the minimum expected set of security controls that assures secure isolation, data protection, access control and monitoring/logging at all tiers of the hosted applications. Cryptographic solutions play an important role in the cloud environment in which customers hand over data to a cloud provider for storage, and processing. One of the biggest hurdles for the adoption of cloud computing by enterprises is security and confidentiality. The premise of the paper will be that the cloud provider acts as a distrusted black box from the client's perspective, and whose duty and interest is the protection of their information and privacy. The techniques presented are shared jointly between the service provider and client, and should protect the interests of both, in establishing a successful and trustworthy service.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call