Efficient Architecture Design For Connecting and Automating of work flows and Cloud Security Control
Abstract
Cloud computing is an upcoming paradigm that offers tremendous advantages in economical aspects, such as reduced time to market, flexible computing capabilities, and limitless computing power. To use the full potential of cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical to place their data outside their own control sphere. This paper discusses to which degree this skepticism is justified, by presenting the Cloud Computing Confidentiality Architecture. The Cloud Computing Confidentiality Architecture is a step-by-step Architecture that creates mapping from data sensitivity onto the most suitable cloud computing architecture. The concept is extended by providing a Reference Architecture which includes a complete overview of the actors and their roles and the necessary architectural components for managing and providing cloud services
Downloads
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the IJRDO Journal will have the full right to remove the published article on any misconduct found in the published article.