Reference Hub1
Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management

Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management

Shweta Kaushik, Charu Gandhi
Copyright: © 2021 |Pages: 19
ISBN13: 9781799889540|ISBN10: 1799889548|EISBN13: 9781799889557
DOI: 10.4018/978-1-7998-8954-0.ch064
Cite Chapter Cite Chapter

MLA

Kaushik, Shweta, and Charu Gandhi. "Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management." Research Anthology on Privatizing and Securing Data, edited by Information Resources Management Association, IGI Global, 2021, pp. 1352-1370. https://doi.org/10.4018/978-1-7998-8954-0.ch064

APA

Kaushik, S. & Gandhi, C. (2021). Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management. In I. Management Association (Ed.), Research Anthology on Privatizing and Securing Data (pp. 1352-1370). IGI Global. https://doi.org/10.4018/978-1-7998-8954-0.ch064

Chicago

Kaushik, Shweta, and Charu Gandhi. "Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management." In Research Anthology on Privatizing and Securing Data, edited by Information Resources Management Association, 1352-1370. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-8954-0.ch064

Export Reference

Mendeley
Favorite

Abstract

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.