Abstract

The focus on cloud security principles, as well as the support provided by cloud specialists within an enterprise, is essential for cloud service clients. Adopting key security approaches and guidelines offers various benefits such as promoting interoperability, preventing client lock-in, and simplifying transitions. These policy norms ensure that basic accepted procedures are being followed by both the enterprise and cloud specialist organisations, and certifications are available for certain principles. These guidelines also provide a way for cloud service clients to evaluate cloud service providers. This paper focuses on the trust and security policies in a distributed computing environment, as well as the various open discussion issues such as trusted execution environment, remote access, collusion threat, data privacy, and endpoint identification.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call