Reference Hub1
Security and Trust in Cloud Computing

Security and Trust in Cloud Computing

ISBN13: 9781522507413|ISBN10: 1522507418|EISBN13: 9781522507420
DOI: 10.4018/978-1-5225-0741-3.ch008
Cite Chapter Cite Chapter

MLA

Kuada, Eric. "Security and Trust in Cloud Computing." Security Solutions for Hyperconnectivity and the Internet of Things, edited by Maurice Dawson, et al., IGI Global, 2017, pp. 184-210. https://doi.org/10.4018/978-1-5225-0741-3.ch008

APA

Kuada, E. (2017). Security and Trust in Cloud Computing. In M. Dawson, M. Eltayeb, & M. Omar (Eds.), Security Solutions for Hyperconnectivity and the Internet of Things (pp. 184-210). IGI Global. https://doi.org/10.4018/978-1-5225-0741-3.ch008

Chicago

Kuada, Eric. "Security and Trust in Cloud Computing." In Security Solutions for Hyperconnectivity and the Internet of Things, edited by Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, 184-210. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0741-3.ch008

Export Reference

Mendeley
Favorite

Abstract

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.