Download PDFOpen PDF in browser

Secured Cloud for Enterprise Computing

12 pagesPublished: March 13, 2019

Abstract

Cloud computing is a transformative technology that organizations cannot ignore. Before adopting cloud computing, an organization must determine its needs and risks and encapsulate them into cloud service provider selection criteria. Due to being sharable and the openly accessible nature of cloud computing, the criteria must highlight data security and protection against malware. Only after developing the criteria, should the organizations select a cloud service provider. Choosing the right provider is essential.

Keyphrases: cloud computing, cloud security, cloud service provider selection, data encryption, data security, malware detection, trusted cloud

In: Gordon Lee and Ying Jin (editors). Proceedings of 34th International Conference on Computers and Their Applications, vol 58, pages 356-367.

BibTeX entry
@inproceedings{CATA2019:Secured_Cloud_Enterprise_Computing,
  author    = {Salman Faizi and Shawon Rahman},
  title     = {Secured Cloud for Enterprise Computing},
  booktitle = {Proceedings of 34th International Conference on Computers and Their Applications},
  editor    = {Gordon Lee and Ying Jin},
  series    = {EPiC Series in Computing},
  volume    = {58},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/Ztxg},
  doi       = {10.29007/bbrx},
  pages     = {356-367},
  year      = {2019}}
Download PDFOpen PDF in browser