Better Security and Encryption Within Cloud Computing Systems
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways...
Saved in:
Published in | International journal of public administration in the digital age Vol. 5; no. 2; pp. 1 - 11 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
IGI Global
01.04.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage |
---|---|
AbstractList | Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage |
Audience | Academic |
Author | Griffin, Jimmy A.G Williams, K.Y.B |
AuthorAffiliation | NETE Solutions, Mclean, USA Walden University, Baltimore, USA |
AuthorAffiliation_xml | – name: Walden University, Baltimore, USA – name: NETE Solutions, Mclean, USA |
Author_xml | – sequence: 1 givenname: K.Y.B surname: Williams fullname: Williams, K.Y.B organization: Walden University, Baltimore, USA – sequence: 2 givenname: Jimmy surname: Griffin middlename: A.G fullname: Griffin, Jimmy A.G organization: NETE Solutions, Mclean, USA |
BookMark | eNp1kDFPwzAQhS1UJErpD2DLikTKOU6cZGAIoRRQJZAKYrRcx0ldtU5kO0P-PakCZQCWu9PpvXe67xyNdK0lQpcYZiHg5Obp-TW7z2ZBP0O_AHyCxgEhoR9GJB0d5wDO0NTaLQDgAKcRjsfo9k46J423kqI1ynUe14U318J0jVO19j6U2yjt5bu6Lby83jetU7ryVp11cm8v0GnJd1ZOv_oEvT_M3_JHf_myeMqzpS8IBueTNU-BFpzGBEsiOIloQElCSBQDFwEWnPOEigQKCSJIyihNIEl5mYYlCQtMyQRdD7kV30m2bq3S0vbFqmrjbMVba1kWU4hpHMZRL8eDXJjaWiNL1hi156ZjGNiBGBuIsR9ivWcxeFSl2LZuje4fYtKwbzKsJ8OOZP4NOly_-iPpl5A1RUk-AXqkhCI |
CitedBy_id | crossref_primary_10_4018_IJPADA_302906 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2018 IGI Global |
Copyright_xml | – notice: COPYRIGHT 2018 IGI Global |
DBID | AAYXX CITATION N95 |
DOI | 10.4018/IJPADA.2018040101 |
DatabaseName | CrossRef Gale Business Insights |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Government |
EISSN | 2334-4539 |
EndPage | 11 |
ExternalDocumentID | A760767475 10_4018_IJPADA_2018040101 er_Security_and_Encryptio10_4018_IJPADA_20180401015 |
GeographicLocations | United States |
GeographicLocations_xml | – name: United States |
GroupedDBID | ABEPT ADEKF ALMA_UNASSIGNED_HOLDINGS COVLG EBS EJD JRD RIF 4.4 AAYXX AFKRA BAAKF BENPR CCPQU CIGCI CITATION CKMBR CNQXE CTSEY IAO ITC N95 PIMPY |
ID | FETCH-LOGICAL-c310t-3ba906da6731e3ca356263833570ac21caaa86c80de0c28f598089af94f34d163 |
ISSN | 2334-4520 |
IngestDate | Tue Oct 08 14:28:48 EDT 2024 Thu Sep 26 16:25:50 EDT 2024 Tue Jan 05 23:30:01 EST 2021 Thu May 09 18:55:07 EDT 2019 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c310t-3ba906da6731e3ca356263833570ac21caaa86c80de0c28f598089af94f34d163 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_4018_IJPADA_2018040101 igi_journals_er_Security_and_Encryptio10_4018_IJPADA_20180401015 gale_businessinsightsgauss_A760767475 |
PublicationCentury | 2000 |
PublicationDate | 2018-04-01T00:00:00 2018-4-1 20180401 |
PublicationDateYYYYMMDD | 2018-04-01 |
PublicationDate_xml | – month: 04 year: 2018 text: 2018-04-01T00:00:00 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | International journal of public administration in the digital age |
PublicationYear | 2018 |
Publisher | IGI Global |
Publisher_xml | – name: IGI Global |
References | IJPADA.2018040101-0 IJPADA.2018040101-1 IJPADA.2018040101-2 IJPADA.2018040101-3 IJPADA.2018040101-4 |
References_xml | – ident: IJPADA.2018040101-3 – ident: IJPADA.2018040101-4 – ident: IJPADA.2018040101-2 – ident: IJPADA.2018040101-0 – ident: IJPADA.2018040101-1 |
SSID | ssj0001219517 |
Score | 2.0945783 |
Snippet | Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the... |
SourceID | gale crossref igi |
SourceType | Aggregation Database Enrichment Source Publisher |
StartPage | 1 |
SubjectTerms | Backup software Cellular telephone services industry Cloud computing Discount stores Safety and security measures |
Title | Better Security and Encryption Within Cloud Computing Systems |
URI | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJPADA.2018040101 |
Volume | 5 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fb9MwELZY97IXtPFDlAGKELxQJSROnDhvS6EwhpgmtInxZNmOUzpt3dSkD-Ov5xw7jbsxifFiVVZ1cu--nu3z3XcIvSFZUokcp76UIvETqrjPBddVwCLCYSpS3JJVfztM90-Sg1Ny2qcVtdUljQjk77_WlfyPVWEO7KqrZO9h2ZVQmIDPYF8YwcIw_pONx20tjo2ZN4ZJaTKXi2vjB37Mml-6qO_8clmOTPuGln_bISk_6xPZ-7igwyZhWbD5GsVulxtZzqa65ciIT_sHHid88zX4GYyDPsFHR4dMJcjs4uJ6VASfAzfmEFEnVaV1TTiOwbAEmxcV5c4ZaqLOtxIHQtjxk5Gz4Rpne9OVw71Plyd8OTgqPhY6BY-Cu4nsItZos29sZ6skQ7jeaCHMiGC9iA20ibOckAHaHE8Oj747MbkIDpxZ24_Q_kDzEK7lvL-1lLWjjN3QN0DzzgHleBs9tDcLrzAw2UEP1PwR2up7KT9GFi9ehxcP8OL1ePEMXrwWL94KL57FyxN08mly_GHft-0zfAln9saPBc_DtORpFkcqljwmmnlIF9llIZc4kpxzmkoaliqUmFYkpyHNeZUnVZyUcE5_igbzy7l6hjyp8hKE5VxEZcLzmIsKU0lVVVWpLjQdonedJtiVYUlhd6p_iN5qXTHbZRWGWseh6ilf1jUrsjTUBFMZGaLXoExmMV_fFsSuymqI9ta-pBasUyIDJbKVEu9cDnl-n8Xvoq3-D_ECDZrFUr2EY2kjXlk0_QGBBIgU |
link.rule.ids | 315,786,790,27955,27956 |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Better+Security+and+Encryption+Within+Cloud+Computing+Systems&rft.jtitle=International+journal+of+public+administration+in+the+digital+age&rft.au=Williams%2C+K.Y.B.&rft.au=Griffin%2C+Jimmy+A.G.&rft.date=2018-04-01&rft.issn=2334-4520&rft.eissn=2334-4539&rft.volume=5&rft.issue=2&rft.spage=1&rft.epage=11&rft_id=info:doi/10.4018%2FIJPADA.2018040101&rft.externalDBID=n%2Fa&rft.externalDocID=10_4018_IJPADA_2018040101 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2334-4520&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2334-4520&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2334-4520&client=summon |