Jump to ContentJump to Main Navigation
Cloud Computing$
Users without a subscription are not able to see the full content.

Nayan B. Ruparelia

Print publication date: 2016

Print ISBN-13: 9780262529099

Published to MIT Press Scholarship Online: September 2016

DOI: 10.7551/mitpress/9780262529099.001.0001

Show Summary Details
Page of

PRINTED FROM MIT PRESS SCHOLARSHIP ONLINE (www.mitpress.universitypressscholarship.com). (c) Copyright The MIT Press, 2018. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MITSO for personal use.date: 13 October 2019

Security and Governance

Security and Governance

Chapter:
(p.99) 5 Security and Governance
Source:
Cloud Computing
Author(s):

Nayan B. Ruparelia

Publisher:
The MIT Press
DOI:10.7551/mitpress/9780262529099.003.0005

Security is considered from a holistic perspective: the user of cloud services, the provider, the applications hosted in the cloud and the devices used to access the cloud services. This analysis is made using the Parkerian Hexad (Confidentiality, Control, Integrity, Authenticity, Availability and Utility) and the CIA Triad (Confidentiality, Integrity and Availability). Enforcing such security regimes is then discussed using security containers and monitoring.Data integrity is considered in terms of encryption, checksums and data loss prevention. Also, data privacy is discussed with regard to Personally Identifiable Data (PID).Legal and compliance issues, especially with regard to the jurisdiction of laws in an international cloud environment, is considered. Finally, a glossary of common security terms is provided.

Keywords:   Security, Governance, Security containers, Data Integrity, Data Privacy, Data Protection, Data Sovereignty, Security terms

MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.