ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

The Use of Compliance as a Way to Drive Credibility for Cloud Hosting

Journal: International Journal of Science and Research (IJSR) (Vol.9, No. 7)

Publication Date:

Authors : ; ; ; ;

Page : 737-745

Keywords : Information management; Compliance; Data; Cloud hosting;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Compliance can be understood as credibility, a competitive advantage for providers of cloud hosting services. Deployment as a way of promoting credibility for cloud hosting has grown in relevance due to the need for capacity, availability, integrity, and security, which are fundamental requirements in this context, as are adequate structure and documentation. Establishing well-defined rules and metrics in dealing with information, as well as its proprietary rights and privacy, grows in relevance at the same rate as the number of users enjoying cloud computing services and the number of attempts to access restricted information through wide range of cyber-attacks. Compliance establishes a comprehensive baseline for an organization's security positioning, thereby reducing the risk of fines, penalties, unplanned downtimes, lawsuits, or business suspension. This study intends to address the cloud data hosting scenario, taking into account this framework and information management for that data, which crosses geo-political boundaries. The article's methodological outline is characterized as a bibliographic and exploratory research. In the descriptive analysis, it was found that it may be seen as a competitive advantage for hosting in the cloud, driving the need for investments in security for the purpose of preventing unauthorized access. The study infers that cloud computing is a safe and low-cost option for storing information and systems.

Last modified: 2021-06-28 17:09:23