Privacy and security practices in the Arena of Cloud Computing - a research in progress

Srilakshmi Ramireddy, Rajarshi Chakraborthy, Raghu Santanam, H. Raghav Rao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

Cloud Computing has become an important player in the field of IT infrastructure outsourcing. The convenience this new computation model brings can however be easily balanced out by the uncertainty behind the "cloud". When so many organizations in the private and public sector are looking at cutting costs and resorting to Cloud services, it becomes imperative to investigate the amount of assurance the Cloud vendors give to their clients. In this paper we have thus explored the assurance related information available on the websites of some contemporary Cloud vendors and have tried to investigate if the characteristics of a vendor play any significant role in the vendor's decision to adopt certain information assurance practices, specifically in the context of Privacy and Security.

Original languageEnglish (US)
Title of host publication16th Americas Conference on Information Systems 2010, AMCIS 2010
Pages4067-4076
Number of pages10
StatePublished - 2010
Event16th Americas Conference on Information Systems 2010, AMCIS 2010 - Lima, Peru
Duration: Aug 12 2010Aug 15 2010

Publication series

Name16th Americas Conference on Information Systems 2010, AMCIS 2010
Volume6

Other

Other16th Americas Conference on Information Systems 2010, AMCIS 2010
Country/TerritoryPeru
CityLima
Period8/12/108/15/10

Keywords

  • ANOVA
  • Assurance unavailability index
  • Cloud Computing
  • Cloud Vendors
  • Emphasis index
  • Information Assurance

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'Privacy and security practices in the Arena of Cloud Computing - a research in progress'. Together they form a unique fingerprint.

Cite this