Abstract
The focus on cloud security principles, as well as the support provided by cloud specialists within an enterprise, is essential for cloud service clients. Adopting key security approaches and guidelines offers various benefits such as promoting interoperability, preventing client lock-in, and simplifying transitions. These policy norms ensure that basic accepted procedures are being followed by both the enterprise and cloud specialist organisations, and certifications are available for certain principles. These guidelines also provide a way for cloud service clients to evaluate cloud service providers. This paper focuses on the trust and security policies in a distributed computing environment, as well as the various open discussion issues such as trusted execution environment, remote access, collusion threat, data privacy, and endpoint identification.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Information Privacy, Security and Integrity
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.