Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Dulce Mourato, Assistant Professor at ISTEC

Media

PDF

To cite this article

Dulce Mourato, Security and Privacy in Cloud Computing: Simple Checklist to Virtualization DOI: 10.31112/kriativ-tech-2021-10-63

Abstract

With the COVID-19 Pandemic, Portuguese enterprises discover the crucial opportunity to make the difference worldwide with virtualization, using Cloud Computing technologies, however they are yet not fully convinced. Cloud security and privacy seems to be the main problems for organizations early adoption. It was possible to use a descriptive methodology, and an literature review approach to differentiate solutions, build on a simple checklist format and reveal essential arguments, that any small and medium-sized Portuguese company should take into account, before purchasing Cloud technologies adapted to its potential growth. One of the major limitations of this study, was the inability to point out at real business environment, only using observation and scientific, technological and specialized level studies, presented here as potential result. The goal was verify if the applications or services implementation for protection and security scalability - really works.

Keywords

Security, Privacy, Cloud Computing, Virtualization, Checklist.

References

[1]  IDC Portugal. Future Enterprise: Building Resiliency and Agility to Thrive in the Next Normal. IDC Futur Scape Portugal - Digital Event. Lisboa, 2021. https://idcportugal.com/solucoes/eventos/ [Accessed 2 11 2021].[2] Aristova, S., Daradkeh Y. I.  & Korolev, P. A General Systems Approach to Cloud Computing Security Issues. Intechopen, 2020. p. 4. https://www.intechopen.com/chapters/71961 [Accessed 2 11 2021].[3] Zissis, D. and Lekkas, D. Addressing cloud computing security issues. Future Generation Computer Systems., pp. 583-592.,2012.http://www.sciencedirect.com/science/article/pii/S0167739X10002554http://dx.doi.org/10.1016/j.future.2010.12.006 [Accessed 2 11 2021].[4] Bhandari B, Zheng J. A Preliminary Study On Emerging Cloud Computing Security Challenges., ACM, 2018. https://arxiv.org/pdf/1808.04143.pdf [Accessed 2 11 2021][5]  Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M. and PourzandI, M. A quantitative analysis of current security concerns and solutions for cloud computing., Journal of Cloud Computing,, pp. 1-18., 2012. https://journalofcloudcomputing.springeropen.com/articles/10.1186/2192-113X-1-11 [Accessed 2 11 2021][6]  Alqahtani, H. A novel approach to providing secure data storage using multi cloud computing. University of Bedfordshire., London. England., 2019. [Accessed 2 10 2021][7]  Ray, D. Cloud Adoption Decisions: Benefitting from an Integrated Perspective. The Electronic Journal Information Systems Evaluation. 2016. 19 (1), 3-21. https://academic-publishing.org/index.php/ejise/article/view/168 [Accessed 2 10 2021][8} Nagahawatta, R.; Warren, M.; Salzman S. and Lokuge S. Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs. PACIS 2021 Proceedings. 7., 2021.[9] Gartner Group. Gartner Top Strategic Technology Trends for 2022.  20 10 2021. [Online]. Available: https://www.gartner.com/en/information-technology/insights/top-technology-trends. [Accessed 2 11 2021].[10]  Brandao, P. R.  and Martins M. CyberSecurity - Risks of Telework. Kriativ-Tech, no. 9, p. 4, 26 October 2021. http://www.kriativ-tech.com/?p=66388[11] Dalmazo, B. A Prediction-based Approach for Anomaly Detection in the Cloud, Coimbra: PhD Thesis, Department of Informatics Engineering Faculty of Sciences and Technology University of Coimbra, 2018. https://eg.uc.pt/bitstream/10316/81235/1/A%20Prediction-based%20Approach%20for%20Anomaly%20Detection%20in%20the%20Cloud.pdf