Securing Cloud Environment

Securing Cloud Environment

N Harini (Amrita Vishwa Vidyapeetham, India), C. K. Shyamala (Amrita Vishwa Vidyapeetham, India) and T. R. Padmanabhan (Amrita Vishwa Vidyapeetham, India)
DOI: 10.4018/978-1-60960-123-2.ch009
OnDemand PDF Download:
$30.00
List Price: $37.50

Chapter Preview

Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential to make computations of the virtual machines confidential and secured. Challenges that cloud computing currently face, when deployed on a large enterprise scale, include self-healing, multi-tenancy, service-orientation, virtualization, scalability and data management. Undoubtedly, any model which involves data assets residing on equipment not within users’ immediate control needs to address security and privacy. Securing the cloud environment encompasses many different things, including standard enterprise security policies on access control, activity monitoring, patch management, etc. This paper focuses on the approaches to secure the cloud environment.
Top

1 Introduction

Cloud computing offers a utility model for IT, enabling users to access applications, middleware and hardware via the Internet as opposed to owning it themselves. It does not require up-front investments, but instead, as an on-demand service, one pays for capacity as needed.

Complete Chapter List

Search this Book:
Reset