In this paper a variety of approaches are presented and assessed that may be used to protect personal and business confidential information within the cloud. Some of these approaches are available for use now; others are relatively immature, but are being currently researched and improved, and look promising for future use. The most appropriate approach varies according to the context and stakeholder requirements and in particular the type of data to be processed or application to be run in the cloud.
|Number of pages||20|
|Journal||Computer Systems Science and Engineering|
|Publication status||Published - 2013|
- Cloud computing
- Hybrid cloud
- Trusted computing
- Virtual private cloud