Better Security and Encryption Within Cloud Computing Systems

Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of public administration in the digital age Vol. 5; no. 2; pp. 1 - 11
Main Authors Williams, K.Y.B, Griffin, Jimmy A.G
Format Journal Article
LanguageEnglish
Published IGI Global 01.04.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage
AbstractList Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage
Audience Academic
Author Griffin, Jimmy A.G
Williams, K.Y.B
AuthorAffiliation NETE Solutions, Mclean, USA
Walden University, Baltimore, USA
AuthorAffiliation_xml – name: Walden University, Baltimore, USA
– name: NETE Solutions, Mclean, USA
Author_xml – sequence: 1
  givenname: K.Y.B
  surname: Williams
  fullname: Williams, K.Y.B
  organization: Walden University, Baltimore, USA
– sequence: 2
  givenname: Jimmy
  surname: Griffin
  middlename: A.G
  fullname: Griffin, Jimmy A.G
  organization: NETE Solutions, Mclean, USA
BookMark eNp1kDFPwzAQhS1UJErpD2DLikTKOU6cZGAIoRRQJZAKYrRcx0ldtU5kO0P-PakCZQCWu9PpvXe67xyNdK0lQpcYZiHg5Obp-TW7z2ZBP0O_AHyCxgEhoR9GJB0d5wDO0NTaLQDgAKcRjsfo9k46J423kqI1ynUe14U318J0jVO19j6U2yjt5bu6Lby83jetU7ryVp11cm8v0GnJd1ZOv_oEvT_M3_JHf_myeMqzpS8IBueTNU-BFpzGBEsiOIloQElCSBQDFwEWnPOEigQKCSJIyihNIEl5mYYlCQtMyQRdD7kV30m2bq3S0vbFqmrjbMVba1kWU4hpHMZRL8eDXJjaWiNL1hi156ZjGNiBGBuIsR9ivWcxeFSl2LZuje4fYtKwbzKsJ8OOZP4NOly_-iPpl5A1RUk-AXqkhCI
CitedBy_id crossref_primary_10_4018_IJPADA_302906
ContentType Journal Article
Copyright COPYRIGHT 2018 IGI Global
Copyright_xml – notice: COPYRIGHT 2018 IGI Global
DBID AAYXX
CITATION
N95
DOI 10.4018/IJPADA.2018040101
DatabaseName CrossRef
Gale Business Insights
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Government
EISSN 2334-4539
EndPage 11
ExternalDocumentID A760767475
10_4018_IJPADA_2018040101
er_Security_and_Encryptio10_4018_IJPADA_20180401015
GeographicLocations United States
GeographicLocations_xml – name: United States
GroupedDBID ABEPT
ADEKF
ALMA_UNASSIGNED_HOLDINGS
COVLG
EBS
EJD
JRD
RIF
4.4
AAYXX
AFKRA
BAAKF
BENPR
CCPQU
CIGCI
CITATION
CKMBR
CNQXE
CTSEY
IAO
ITC
N95
PIMPY
ID FETCH-LOGICAL-c310t-3ba906da6731e3ca356263833570ac21caaa86c80de0c28f598089af94f34d163
ISSN 2334-4520
IngestDate Tue Oct 08 14:28:48 EDT 2024
Thu Sep 26 16:25:50 EDT 2024
Tue Jan 05 23:30:01 EST 2021
Thu May 09 18:55:07 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c310t-3ba906da6731e3ca356263833570ac21caaa86c80de0c28f598089af94f34d163
PageCount 11
ParticipantIDs crossref_primary_10_4018_IJPADA_2018040101
igi_journals_er_Security_and_Encryptio10_4018_IJPADA_20180401015
gale_businessinsightsgauss_A760767475
PublicationCentury 2000
PublicationDate 2018-04-01T00:00:00
2018-4-1
20180401
PublicationDateYYYYMMDD 2018-04-01
PublicationDate_xml – month: 04
  year: 2018
  text: 2018-04-01T00:00:00
  day: 01
PublicationDecade 2010
PublicationTitle International journal of public administration in the digital age
PublicationYear 2018
Publisher IGI Global
Publisher_xml – name: IGI Global
References IJPADA.2018040101-0
IJPADA.2018040101-1
IJPADA.2018040101-2
IJPADA.2018040101-3
IJPADA.2018040101-4
References_xml – ident: IJPADA.2018040101-3
– ident: IJPADA.2018040101-4
– ident: IJPADA.2018040101-2
– ident: IJPADA.2018040101-0
– ident: IJPADA.2018040101-1
SSID ssj0001219517
Score 2.0945783
Snippet Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the...
SourceID gale
crossref
igi
SourceType Aggregation Database
Enrichment Source
Publisher
StartPage 1
SubjectTerms Backup software
Cellular telephone services industry
Cloud computing
Discount stores
Safety and security measures
Title Better Security and Encryption Within Cloud Computing Systems
URI http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJPADA.2018040101
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fb9MwELZY97IXtPFDlAGKELxQJSROnDhvS6EwhpgmtInxZNmOUzpt3dSkD-Ov5xw7jbsxifFiVVZ1cu--nu3z3XcIvSFZUokcp76UIvETqrjPBddVwCLCYSpS3JJVfztM90-Sg1Ny2qcVtdUljQjk77_WlfyPVWEO7KqrZO9h2ZVQmIDPYF8YwcIw_pONx20tjo2ZN4ZJaTKXi2vjB37Mml-6qO_8clmOTPuGln_bISk_6xPZ-7igwyZhWbD5GsVulxtZzqa65ciIT_sHHid88zX4GYyDPsFHR4dMJcjs4uJ6VASfAzfmEFEnVaV1TTiOwbAEmxcV5c4ZaqLOtxIHQtjxk5Gz4Rpne9OVw71Plyd8OTgqPhY6BY-Cu4nsItZos29sZ6skQ7jeaCHMiGC9iA20ibOckAHaHE8Oj747MbkIDpxZ24_Q_kDzEK7lvL-1lLWjjN3QN0DzzgHleBs9tDcLrzAw2UEP1PwR2up7KT9GFi9ehxcP8OL1ePEMXrwWL94KL57FyxN08mly_GHft-0zfAln9saPBc_DtORpFkcqljwmmnlIF9llIZc4kpxzmkoaliqUmFYkpyHNeZUnVZyUcE5_igbzy7l6hjyp8hKE5VxEZcLzmIsKU0lVVVWpLjQdonedJtiVYUlhd6p_iN5qXTHbZRWGWseh6ilf1jUrsjTUBFMZGaLXoExmMV_fFsSuymqI9ta-pBasUyIDJbKVEu9cDnl-n8Xvoq3-D_ECDZrFUr2EY2kjXlk0_QGBBIgU
link.rule.ids 315,786,790,27955,27956
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Better+Security+and+Encryption+Within+Cloud+Computing+Systems&rft.jtitle=International+journal+of+public+administration+in+the+digital+age&rft.au=Williams%2C+K.Y.B.&rft.au=Griffin%2C+Jimmy+A.G.&rft.date=2018-04-01&rft.issn=2334-4520&rft.eissn=2334-4539&rft.volume=5&rft.issue=2&rft.spage=1&rft.epage=11&rft_id=info:doi/10.4018%2FIJPADA.2018040101&rft.externalDBID=n%2Fa&rft.externalDocID=10_4018_IJPADA_2018040101
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2334-4520&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2334-4520&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2334-4520&client=summon