{"id":66120,"date":"2020-03-24T15:54:06","date_gmt":"2020-03-24T15:54:06","guid":{"rendered":"http:\/\/www.kriativ-tech.com\/?p=66120"},"modified":"2020-03-24T21:35:32","modified_gmt":"2020-03-24T21:35:32","slug":"cloud-data-security","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66120","title":{"rendered":"Cloud Data Security"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]Kriativ-tech<br \/>\nVolume 1, Issue 7, April 2018, Pages: xxx<br \/>\nReceived: Dec. 28, 2019;<\/p>\n<p>Accepted: Feb. 25, 2020.<\/p>\n<p>Published: Feb. 28, 2020.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]Pedro Ramos Brand\u00e3o, <span lang=\"EN-US\">Coordinating Professor \u2013 ISTEC<\/span><\/p>\n<p><span lang=\"PT\">Rui Antunes Andr\u00e9,\u00a0<\/span><span lang=\"EN-US\">Master&#8217;s Student in Informatics \u2013 ISTEC<\/span>[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2018%2F02%2FPedroBrandaoRuiAndreCloudSecurity.pdf||target:%20_blank|&#8221;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243;]<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Pedro Ramos Brand\u00e3o, Rui Antunes Andr\u00e9,<b><span lang=\"PT\">Cloud Data Security<\/span><\/b><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>DOI:\u00a010.31112\/kriativ-tech-2018-01-21[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]<span lang=\"EN-US\">The rapid growth of Cloud Based solutions creates a new paradigm that at same time raises and addresses many of the computer data security problems and challenges. On one side moving to Cloud can address some actual weaknesses and gaps of the enterprise security infrastructure and procedures but on the other side there is a new world of issues that must be addressed when moving infrastructure to a shared third-party provider. This paper will address some of these general drivers and concerns.<\/span>[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><span lang=\"EN-US\">Cloud, Security, DataCenter, SOC<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;][1] vXchnge. (2019). What Are the Most Important Data Center Security Standards. Retrieved 26 February 2020, from<a href=\"https:\/\/www.vxchnge.com\/blog\/data-center-physical-security-standards\">https:\/\/www.vxchnge.com\/blog\/data-center-physical-security-standards<\/a><\/p>\n<p>[2] Data Center. (2018). Data Center Redundancy: N+1, 2N, 2(N+1) or 3N2 (distributed). Retrieved 26 February 2020, from<a href=\"https:\/\/datacenter.com\/news_and_insight\/data-center-redundancy-2plus1-2n-distributed-redundancy\/\">https:\/\/datacenter.com\/news_and_insight\/data-center-redundancy-2plus1-2n-distributed-redundancy\/<\/a><\/p>\n<p>[3] Quote Colo. (2013). What is 2N Power and why it is important to Colocation Customers. Retrieved 26 February 2020, from<a href=\"https:\/\/www.quotecolo.com\/what-is-2n-power-why-it-is-important-to-colocation-customers-2\/\">https:\/\/www.quotecolo.com\/what-is-2n-power-why-it-is-important-to-colocation-customers-2\/<\/a><\/p>\n<p>[4] Computer Weekly. (2011). Tier 3 Data Center design: the cooling checklist. Retrieved 26 February 2020, from<a href=\"https:\/\/www.computerweekly.com\/tip\/Tier-3-data-center-design-The-cooling-checklist\">https:\/\/www.computerweekly.com\/tip\/Tier-3-data-center-design-The-cooling-checklist<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[5] Wikipedia. (2020). SOC. Retrieved 26 February 2020, from <a href=\"https:\/\/pt.wikipedia.org\/wiki\/SOC\">https:\/\/pt.wikipedia.org\/wiki\/SOC<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[6] Security Operation Center Concepts &amp; Implementation. Renaud Bidou (2020). Retrieved 26 February 2020, from <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.93.8577&amp;rep=rep1&amp;type=pdf\">http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.93.8577&amp;rep=rep1&amp;type=pdf<\/a><\/p>\n<p>[7] Wikipedia. (2020). Business Continuity Planning. Retrieved 26 February 2020, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_continuity_planning\">https:\/\/en.wikipedia.org\/wiki\/Business_continuity_planning<\/a><\/p>\n<p>[8] Wikipedia. (2020). Disaster Recovery. Retrieved 26 February 2020, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Disaster_recovery\">https:\/\/en.wikipedia.org\/wiki\/Disaster_recovery<\/a><\/p>\n<p>[9] National Institute of Standards and Technology. (2011). The NIST definition of Cloud Computing. Retrieved 26 February 2020, from <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-145.pdf\">https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-145.pdf<\/a><\/p>\n<p>[10] Statista. (2020). Amazon leads $100 billion Cloud market. Retrieved 26 February 2020, from <a href=\"https:\/\/www.statista.com\/chart\/18819\/worldwide-market-share-of-leading-cloud-infrastructure-service-providers\/\">https:\/\/www.statista.com\/chart\/18819\/worldwide-market-share-of-leading-Cloud-infrastructure-service-providers\/<\/a><\/p>\n<p>[11] Microsoft Azure. (2020). Regi\u00f5es do Azure. Retrieved 26 February 2020, from <a href=\"https:\/\/azure.microsoft.com\/pt-pt\/global-infrastructure\/regions\/\">https:\/\/azure.microsoft.com\/pt-pt\/global-infrastructure\/regions\/<\/a><\/p>\n<p>[12] Wikipedia. (2020). Data Center. Retrieved 26 February 2020, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_center\">https:\/\/en.wikipedia.org\/wiki\/Data_center<\/a><\/p>\n<p>[13] Wikipedia. (2020). Data Center da Covilh\u00e3. Retrieved 26 February 2020, from <a href=\"https:\/\/pt.wikipedia.org\/wiki\/Data_Center_da_Covilh%C3%A3\">https:\/\/pt.wikipedia.org\/wiki\/Data_Center_da_Covilh%C3%A3<\/a><\/p>\n<p>[14] Uptime Institute. (2020). Uptime Institute. Retrieved 26 February 2020, from <a href=\"https:\/\/uptimeinstitute.com\/\">https:\/\/uptimeinstitute.com\/<\/a><\/p>\n<p>[15] Microsoft. (2020). Security Operations. Retrieved 26 February 2020, from <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/operations\">https:\/\/www.microsoft.com\/en-us\/security\/business\/operations<\/a><\/p>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pedro Ramos Brand\u00e3o | Rui Antunes Andr\u00e9<br \/>\nDOI:\u00a010.31112\/kriativ-tech-2018-01-21<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66120"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66120"}],"version-history":[{"count":3,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66120\/revisions"}],"predecessor-version":[{"id":66139,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66120\/revisions\/66139"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}