ITC 571 Emerging Technologies and Innovation Proof Reading Services

ITC 571 Emerging Technologies and Innovation Assignment Help

ITC 571 Emerging Technologies and Innovation Proof Reading Services

Abstract

This study is related to the identification of the tools and techniques which are helpful in maintaining internal data security in cloud computing. In this regard, the main aim of this study is to identify the tools that can be used effective management of data on the cloud. This includes identification of the methods which are useful in safeguarding the security of data into cloud computing. The methods that have been used for such evaluation is a collection of data from the various literature. This includes a collection of data from secondary sources on the basis of various literatures which are related to cloud computing. The findings of this study include the proposed solution which is considered as the best solution in maintaining internal data security in cloud computing. Further, this study also involves recommending the measures which can be implemented by the organizations are other authorities which are involved with the use of cloud computing systems.

Introduction

1.1 Background

Cloud computing refers to the practise of a network of remote servers which are utilised over an online platform and is helpful in the effective management of data which is related to an organization or related systems. Cloud systems are helpful in the effective management of data through the use of internet technologies rather than the use of local computers or personal computers. Cloud computing provides storing and accessing data and other programs on online platforms. This allows storing the data on the internet rather than the hard drive of computers so it provides data access facilities anywhere and at any time. Further, through the help of cloud computing systems, flexibility and convenience of individuals have been increased as it provides a global scale for utilising the IT resources in the most appropriate way (Sarkar & Kumar, 2016).

1.2 Problems /issues

Cloud computing systems provide storing of data over the online platform which is helpful in managing the process of data in effective and efficient ways. Users to cloud computing systems are required to login to the cloud so that they can get access to cloud computing data. For this cloud, users are provided with their ID’s and passwords for getting access to cloud computing data. In this regard, these current solutions are not sufficient enough to safeguard the security of data which is maintained in the cloud. Hence this problem is faced h the cloud users that they feel risk while maintaining their data in cloud computing systems (Bhukya, et. al., 2016). These risk involved data issues relating to the security of data, loss of data, leakage of data etc. This problem related to security of data in cloud computing is a major issue which is faced by cloud users. Hence this study is conducted with an aim to strengthen compliance and security in cloud computing.

1.3 Significance of the Study

There are various researches which have been conducted on the topics related to cloud computing and other such systems. These researchers are conducted with a view to cover the various aspects which are related to cloud computing but this study mainly focuses on the ways to strengthen the compliance and internal data security in cloud computing. Hence this study is beneficial in safeguarding the interest of cloud users. This study is also significant in identifying the tools and technologies that can be implemented in cloud computing for reducing the risks related to data in cloud computing. This study is also significant in solving all the data security related issues of cloud users. This study is significant in identifying the measures for reducing the data security risks in cloud computing (Balogh & Tur?áni, 2016).

1.4 Purpose and aims

The main purpose of this study is to identify the best solution for Internal Data security auditing to strengthen compliance in cloud computing. Further, the aims for which this study is conducted are as follows.

1. To identify the various types of issues which are involved with internal data security in cloud computing.
2. To identify the solutions which are currently been used for reducing the risk of data security in cloud computing systems.
3. To evaluate the identified measures towards maintaining data security in cloud computing (Sarkar & Kumar, 2016).
4. To propose a new solution as the best solution in safeguarding the security of data in cloud computing systems.

2. Literature Review

2.1 Cloud computing

Cloud computing denotes the delivery of various computing services including servers, storage, networking, software, databases etc. over the internet. Cloud computing allows management of all the services over an online platform. These systems can be accessed by any person and at any time who is an authorized cloud user. In cloud computing systems data is synchronised with the information over the web and through the use of internet such cloud data can be easily accessed. The trend of cloud computing is increasing day by day and many big companies such as Amazon IBM, Google, Microsoft Azure etc. are involved with providing services related to the creation of cloud environment. The major concern which is associated with cloud computing is the security of data as the data in cloud computing is transmitted to the remove servers through the channels which involve internet channels (Sarkar & Kumar, 2016). Hence this transmission involved creating a risk to the security of data in cloud computing.

ITC 571 Emerging Technologies and Innovation

ITC 571 Emerging Technologies and InnovationITC 571 Emerging Technologies and Innovation

ITC 571 Emerging Technologies and Innovation

2.2 Advantages of cloud computing

Cloud computing has resulted in increasing the convenience for the organizations in the effective management of data. Hence cloud computing has opened up with a variety of advantages for all those which are involved in the use of these systems. Cloud computing is helpful in reducing the costs which are incurred by organizations on hardware and other related updates. It is beneficial in coping up with the demands of businesses through providing anytime access facilities to the cloud users. Further cloud computing is also helpful in monitoring the overall IT infrastructure of a business through managing the data properly (Balogh & Tur?áni, 2016).

2.3 Disadvantages of cloud computing

It can be seen that there are several advantages of using cloud computing but apart from the advantages, there are certain disadvantages involved with the use of cloud computing. The main issue which is related to the use of cloud computing is the risk of data security. The current solutions in cloud computing are not reliable to maintain internal data security in cloud computing. Hence the risk of data security is one of the major disadvantages of cloud computing. Further disadvantages of cloud computing include flexibility that cloud computing is not suitable for all types of businesses as the use of cloud computing differs from the needs and comfort level of all the businesses (Bhukya, et. al., 2016). Cloud computing is a cost effective method for managing the data in an organization but these cloud computing applications require a large amount of investment. It also involved other costs such as data transfer costs etc.  

2.4 Data security issues in cloud computing

Data security issues refer to the issues of cloud computing which are related to the security of data in cloud computing. It can be seen that data security is the major issue in cloud computing which creates the risks related to data among cloud users. Data security issues in cloud computing involve data integrity issues, data confidentiality issues, data availability and data privacy issues. (Sarkar & Kumar, 2016) These issues are related to the security of data in cloud computing. These risks affect the maintenance of data in cloud computing which results as data loss, data leakage etc. data security issues also involves data access, data location, data breach, data loss and all other risks which are associated with the use of data in cloud computing systems.

2.5 Security and compliance overview and people and identity management in cloud computing

There are very fewer measures which are available for maintaining internal data security in cloud computing and it can also be seen that these measures are not strong enough to boost data security and compliance in cloud computing. In the words of Katsuno, et. al. (2016), Current measures which are used are strong passwords as the cloud users are provided with their login ID’s and passwords. Further, they can login to cloud systems through the use of such login ID and password. This is helpful in allowing only authorized users to access to cloud computing data. Further cloud security is also maintained through putting a strong firewall, installing antivirus protection to save the system from virus attacks, through upgrading the cloud programs on regular basis etc. Cloud data is also backed up on a regular basis so that any mis happening does not affect the protection of data in cloud computing. This backup is helpful in maintaining the cloud data at a safe place which is free from any kind of risk. Apart from these measures, there are several other measures which are used for maintaining internal data security such as access control model, isolation model, IT compliance model, Data driven usage control etc. Keeping an overview on security and compliances on regular basis is also helpful in maintaining data security and compliance in cloud computing (Al-Anzi, et. al., 2014). Automatic verification model, compliance vocabulary, cloud adoption methodology are such tools and methods which are used for maintaining the security of data which is stored in cloud computing systems.

2.6 Access control model and isolation model in cloud computing

Access control model in cloud computing is helpful in restricting the scale of cloud users through a limit up to which they are able to access to cloud data. This model is useful in restricting the access of cloud users up to a certain extent so that cloud security can be easily maintained (Majumdar, et. al., 2015). Further isolation model is based on the concept of limiting the access of cloud system to isolated tenants which means that only authorised users to cloud computing systems are permitted to access the cloud computing data (Singh, et. al., 2015).

2.7 IT compliance model and data driven usage control in cloud computing

In the opinion of Hendre & Joshi (2015), Cloud computing is helpful in improving the regulatory compliances which are related to a business. In this regard, IT compliance model in cloud computing is an effective measure in identifying the related auditing standards which are to be implemented in cloud systems for maintaining the security of cloud data. Further data driven usage is helpful in checking, monitoring and controlling the flow of data in cloud computing. Through this, the flow of data in cloud computing can control and security of cloud data can be effectively maintained (Wuchner, et. al., 2013).  

2.8 Automatic verification model and compliance vocabulary in cloud computing

Automatic verification model in cloud computing is based on the concept of verifying and detecting the threats related to data security in cloud computing. In the words of Khan & Bai (2013), Further through detecting such threats preventive measures can be taken for reducing the negative effects of such threats on cloud computing data. On the other hand compliance vocabulary in cloud computing is helpful in fulfilling the compliance requirements which are related to data security in cloud computing. Through this effective security standard for cloud computing can be effectively maintained (Hale & Gamble, 2013).

2.9 Automatic security compliance check and cloud server provisioning environment in cloud computing

Automatic security compliance check model is helpful in strengthening the security mechanisms in cloud computing through allowing only authorised users to access to cloud computing systems (Ullah, et. al., 2013). Further Cloud server provisioning environment is helpful in maintaining data security in cloud computing through accepting the requests for accessing cloud computing data. Through this high security standard in cloud computing can be established which can further work as reducing the threats to cloud computing data (Chieu, et. al., 2012)

2.10 Cloud adoption methodology and SLA compliance checking in cloud computing

According to Pant and Parappa (2013), Cloud adoption methodology is based on the concept which is related to restructure the IT related needs of cloud computing. This restructuring involves addressing the IT requirements related to security and compliances in cloud computing. On the other hand, SLA compliance checking is also helpful in using SLA compliance approach for setting effective security standards in cloud computing systems (Chazalet, 2010).

2.11 Cloud ERP and GOReM approach in cloud computing

In the words of Gupta & Misra (2016), Cloud ERP is helpful in increasing the ability of cloud computing systems so that they are able to fulfil the requirements of cloud users. It is beneficial in identifying various choices related to cloud ERP and then implementing those requirements in cloud computing systems of organizations. On the other hand GOReM approach is beneficial in establishing effective mechanisms for fulfilling the security requirements of cloud computing (Furfaro, et. al., 2016).

2.12 Stakeholders’ responsibility and EMC approach in cloud computing

Defining the roles and responsibilities of stakeholders in cloud computing is also helpful in implementing effective security standards to maintaining data security in cloud computing. In the words of Kandira, et. al. (2013), this is helpful in reviewing the cloud computing systems on a regular basis so that effective policies and procedures can be implemented in cloud computing systems. Further EMC approach is also an effective solution for maintaining data security in cloud computing systems as this allows EMC tests so that threats to data security can be identified and the same can be resolved through implementing effective compliance and security standards (Wu, et. al., 2016).

2.13 First Current best solution: Access control model

Access control model is useful in maintaining internal data security in cloud computing through restricting the access control of users to cloud computing systems. With the use of this model, a user can only access to cloud computing data to the extent for which he is permitted to access cloud computing system. This solution is helpful in limiting the control of users to cloud computing systems. Data security in cloud computing can be maintained where users will not be able to access to cloud computing data beyond their permitted extent.

Issues in first current best solution

There are certain issues involved with a current best solution that it is not able to fulfil the cloud security requirements. Access control model is not flexible for fulfilling data security requirements in every type of organization as it can be seen that all cloud computing systems are having their own methods for data access (Majumdar, et. al., 2015). Hence access control model is not flexible in comparison to other schemes for maintaining internal data security in cloud computing Apart from this there are many types of access control models which can be implemented within cloud computing system to maintain data security hence it is difficult to identify the suitable access control model as per the requirement of organization.

Solutions to issues in the first current best solution

The security mechanisms in access control model in cloud computing must strengthen that it is able to maintain cloud data security effectively and efficiently. All the types of access control models must have their own features that they are able to fit as per the cloud systems requirements of organizations. The cloud security mechanisms must be sufficient enough to fulfil the data security needs of cloud computing systems (Majumdar, et. al., 2015). A possible solution to overcome these issues is to develop a new model which is able to fit into the cloud computing requirements of every organization that it must be able to promote data security in cloud computing.

Stages to the generation of proposed model which is automatic security compliance check from access control model which is first current best solution

The above model shows the Access control model, ITC 571 Assignment Help

internal data security, ITC 571 Emerging Technologies and Innovation

Stage 2: In the above model, Green variables shows the variables of access control model which are to be replaced for maintaining internal data security. Further the explanations of the variables by which these variables are to be replaced are explained in the box.

internal data security, ITC 571 Assignment Help Australia

Stage 3: The above model shows the synchronization of access control model and automatic security compliance check. The variables of automatic security compliance check which are to be synchronised in the access control model are highlighted in yellow colour.

Automatic Security Compliance Check

Stage 4: The above model shows the generation of automatic security compliance check from the variable of access control model. Further the explanation for generation of variable has been provided in the boxes.

access control model, ITC 571 Affordable assignment Help

Stage 5: The above model shows automatic security compliance check model

2.13 Real time case scenarios relating to use of Automatic Security compliance check

Amazon Web Services uses Automatic Security Compliance Check model in their cloud computing system for effective storage capacity and protection of data. This model enables reliability and security of data of Amazon Web Services. This model is also beneficial for the company in accessing to virtual servers and data storage space. Automatic security compliance check model is helpful for Amazon Web Services in allowing the authorized users to access cloud computing data. This is helpful in ensuring data security in cloud computing systems of the company. With the help of automatic security compliance check, Amazon Web Services is also able to deliver large scale computing capacity to its stakeholders as this model reduces the risk of data security (Amazon Web Services, 2017).

Work Flow Diagram in Amazon Web Services

Work Flow Diagram in Amazon Web Services, ITC 571 Emerging Technologies and Innovation

Microsoft Azure is a cloud computing service which is created by Microsoft where this company is engaged into building, deploying and developing cloud related services. Further for effective management of data centers, Microsoft Azure uses automatic security compliance check model in its cloud computing systems. This model is beneficial for Microsoft Azure in reducing the cost of infrastructure, maintaining data security and privacy, improving their legislations, policy concerns and maintaining the system of quality in cloud computing. Automatic Security Compliance Check is fulfilling the cloud requirements which are related to the business of Microsoft Azure. Automatic Security Compliance Check model for the business of Microsoft Azure is helpful in protecting the data from unauthorised access and hence it contributes towards maintaining data security in cloud computing systems of Microsoft Azure (Microsoft Azure, 2017).

Work flow diagram in Microsoft Azure

Work flow diagram in Microsoft Azure, ITC 571 Affordable Assignment Help

IBM also uses Automatic Security Compliance Check model for improving its business processes through effective management of data in cloud computing systems. This model also helps IBM in compliance verification so that it is able to secure its cloud computing data in appropriate ways. This model enables process verification where identity of the cloud user is verified first and after such verification a user is permitted to access cloud computing systems. Hence this process verification in Automatic Security Compliance Check model is beneficial for IBM in protecting its data from unauthorized access. It can be seen that Automatic Security Compliance Check model is able to fulfil the data security requirements through managing the identity of cloud users which is helpful in resolving the purpose related to maintaining data security in cloud computing of IBM (IBM, 2017).

Work flow diagram at IBM

Work flow diagram at IBM, ITC 571 Online Assignment Help

2.14 Real time case scenario relating to replacement with Automatic Security Compliance Check model

The case study of Panorama Towers defines the issues which were involved in access control model and as a result Panorama Towers replaced access control model. In the case study of Panorama Towers it can be seen that access control model was not able to provide sufficient functionality. Access control was not resident friendly and as a result they tend to replace the existing access control model. The new solution which was required by Panorama Towers was to effectively manage the verification of identity and a truly accountable access control model (Panorama Towers, 2017). Hence the model which is able to manage the verification of identity for Panorama towers is Automatic Security Compliance Check. This model is able to provide sufficient level of functionality to Panorama Towers where Automatic Security Compliance Check model is also able to manage the identity of cloud users in Panorama Towers so that data security in cloud computing can also be maintained in effective and efficient ways. This model is also able to manage the identity of cloud users so that only authorised users are able to access the cloud systems of Panorama Towers. On the basis of all above discussion, it can be concluded that the model which is able to fulfil the verification of identity requirements is Automatic Security  Compliance Check model which is also overcoming the issues of the use of access control model in Panorama Towers.

Work flow diagram at Panorama Towers

Work flow diagram at Panorama Towers, ITC 571 Emerging Technologies and Innovation 

3. A proposed model: Automatic Security Compliance Check

Proposed model for this study is automatic security compliance check as this model is helpful in checking the identity of cloud users. This model is based on the concept to allow authorised users to access cloud computing data. Automatic security compliance check model is based on the concept of identity management where this model identifies the identity of the cloud user. Further, if such cloud user is a credible or authorised user then he will be allowed to access the cloud computing data. On the other hand, if such user is not credible then his request for accessing cloud data will be denied (Ullah, et. al., 2013). This system is useful in permitting only authorised users and hence the data security in cloud computing can be maintained through the use of this model.

Automatic Security Compliance Check

3.1 Justifications of the model

This solution is been considered as the best solution for maintaining internal data security in cloud computing. All the identified solutions that are currently been used for maintaining data security in cloud computing are an evaluation. On the basis of such evaluation, automatic security compliance check has been analysed as the best method for fulfilling the purpose related to data security and compliances in cloud computing (Ullah, et. al., 2013). Automatic security compliance check is a collective solution which can be used for fulfilling the essential requirements related to data security in cloud computing. This model provides a high level overview of the security architecture related to data security in cloud computing.

3.2 Explanation of the model

Automatic security compliance check involves various elements such as data collection engine, verification engine, and cloud audit API etc. all these elements are necessary for boosting the strength of security mechanisms in cloud computing. The first step of this model includes verification of the compliance status of the individual which is collecting data from cloud computing systems. In the words of Ullah, et. al. (2013), this requires the users to make an access request to cloud computing systems. further, it involved verifying the identity of the user through verification engine. In this step, it includes checking the identity of the user and if the user is authorised then his request must be accepted and he must be allowed to access cloud computing data. On the contrary, if such user is not authorised then his request must be denied and he will not be able to access his request for cloud computing data. This overall system involves maintaining the data security in cloud computing through verifying the identity of cloud user. This model is also overcoming the limitations of the current best solution which is access control model. Automatic security compliance check model has covered all the data security requirements which are related to cloud computing systems hence this model is considered as a model which is suitable in strengthening data security and compliances in cloud computing. Through the involved verification engine, automatic security compliance check is able to detect the possible threats to cloud computing systems (Ullah, et. al., 2013). Verification engine in cloud computing system are able to detect the possible threats to cloud systems and as a result of this, the same threats can be resolved through taking effective measures for boosting the security mechanisms in cloud computing. This model is helpful in building effective security mechanisms for cloud computing systems so that the risk of data security in cloud computing can be reduced.

3.3 Strengths of the model

Automatic security compliance check is a universal model which is significant in complying with all the data security requirements which are related to cloud computing systems. This model has been identified through collecting the data related to various other models which are used for ensuring data security in cloud computing. This model is a time and cost effective model which boosts the security mechanisms of cloud computing systems so that cloud data can be securely maintained. This is also beneficial in reducing the risk such as data loss, data leakage etc. related to cloud computing systems. This model ensures that a security check is conducted on every cloud user so that every cloud user accessing the cloud computing system must be an authorised user. This model has been identified through overcoming the limitations of other models which are currently been used for ensuring the data security in cloud computing (Ullah, et. al., 2013).

3.4 Weaknesses of the model

There are various challenges and weaknesses which are involved in automatic security compliance check such as this model requires formulizing the set of requirements which are essential to be complied by the cloud computing systems. There is a lack of guidance for implementing the standards in the automatic security compliance check model. This model requires effective security mechanisms for identity management so that these systems are able to differentiate between authorised and unauthorised users. There is a lack of information which is required for establishing security control verification in this model as the main concept on which this model is based is related to verification of the identity of the cloud user so it requires strong mechanisms for assuring the security and integrity of cloud data. Certain other challenges and issues are required to be faced by the organizations towards shifting to automatic security compliance check model such as modifying the existing systems to effectively implement data extraction (Ullah, et. al., 2013).

4. Implementation of the model

Automatic security compliance check is to be implemented in all the cloud computing systems which are in need of boosting their security and compliance mechanism. This model is to be implemented through establishing automatic security compliance check in cloud computing system of organization. Automatic security compliance check is to be implemented through the use of Cloud API, verification engine and data collection engine etc. These elements are necessary elements to the Automatic security compliance check model. Further, this model involves a whole process which is required to be implemented step by step from a client which is making an access request to the access to cloud computing data (Bhukya, et. al., 2016). The context where automatic security compliance check is to be implemented is related to boosting the security mechanisms and compliances for protecting the data which is stored in cloud computing systems. Further automatic security compliance check involves a variety of security mechanism and other related mechanisms which are helpful in boosting the tools for identity management in this model. It can be seen that this model is fully based on the concept of identity verification so that tools and techniques which can result as verifying the identity of cloud users are included in this model (Ullah, et. al., 2013). 

5. Evaluation of implementation

The possible outcomes of Automatic Security Compliance check is a model which is helpful in fulfilling the data security requirements which are related to cloud computing. As it can be seen that there are several uses of using cloud computing technologies but the only issue which is involved with the use of cloud computing systems is related to the risk of data security. For resolving this risk, Automatic Security Compliance check has been proposed as a model which can boost the security mechanisms in cloud computing systems. Possible outcomes of this model are related to fulfilling the data security requirements of cloud computing systems (Ullah, et. al., 2013). The issues which can be faced in the implementation of Automatic Security Compliance check model are related to the standards and mechanisms which can be used in this model for boosting the data security in cloud systems. These issues can be resolved through identifying the data security requirements of and further implementing the same in the cloud computing systems.

6. Conclusion with Recommendations

This overall study has concluded various aspects which are related to boosting and maintaining the security of data in cloud systems. This study has identified various solutions, models, and technologies which are currently been used as mechanisms for maintaining internal data security in cloud computing. Further, this report has provided various other solutions which are based on various literature (Sarkar & Kumar, 2016). On the basis of all the collected solutions, each solution has been analysed to identify the best solution which is helpful in fulfilling the data security requirements related to cloud computing systems. Further, this report has proposed as a new solution which is Automatic Security Compliance check and this solution has been considered as the best solution as this solution is overcoming the limitations which are involved with the other solutions and models which are available for maintaining data security in cloud computing systems.

Further, it is recommended that cloud computing is such a wider concept and there is a lot of scope for conducting research in this area. The results from this study are concluded with the proposed new model which is Automatic Security Compliance check which is beneficial in maintaining the security of data which is maintained in cloud computing systems. On the basis of all above discussion, it can be recommended that cloud data security is a major concern which is required to be resolved for effective preserving data security in cloud computing. In this regard, it is recommended that the security and compliance mechanisms in cloud computing systems must be strong and sufficient enough to preserve the data in cloud computing effectively and efficiently.

References

Al-Anzi, F. S., Yadav, S. K., & Soni, J. (2014). Cloud computing: Security model comprising governance, risk management and compliance. IEEE. pp. 1-6.

Amazon Web Services, (2017). Choosing a Cloud Platform. Available at https://aws.amazon.com/choosing-a-cloud-platform/?sc_channel=PS&sc_campaign=acquisition_IN&sc_publisher=google&sc_medium=cloud_computing_b&sc_content=sitelink&sc_detail=amazon.%20web%20services&sc_category=cloud_computing&sc_segment=choosing_a_cloud_platform&sc_matchtype=e&sc_country=IN&s_kwcid=AL!4422!3!188874849330!e!!g!!amazon.%20web%20services&ef_id=WEEeagAABMO@hXfj:20170524104610:s. Accessed on May 05, 2017.

Balogh, Z., & Tur?áni, M. (2016). Modeling of data security in cloud computing. IEEE. pp. 1-6.

Bhukya, S., Pabboju, S., & Sharma, K. V. (2016). Data security in cloud computing and outsourced databases. IEEE. pp. 2458-2462.

Chazalet, A. (2010). Service level agreements compliance checking in the cloud computing: architectural pattern, prototype, and validation. IEEE. pp. 184-189.

Chieu, T. C., Singh, M., Tang, C., Viswanathan, M., & Gupta, A. (2012). Automation system for validation of configuration and security compliance in managed cloud services. IEEE. pp. 285-291.

Furfaro, A., Gallo, T., Garro, A., Saccà, D., & Tundis, A. (2016). Requirements specification of a cloud service for cyber security compliance analysis. IEEE. pp. 205-212.

Gupta, S., & Misra, S. C. (2016). Moderating Effect of Compliance, Network Security on the Critical Success Factors in the Implementation of Cloud ERP. IEEE. Vol. 4, issue 4, pp. 440-451.

Hale, M. L., & Gamble, R. (2013). Building a compliance vocabulary to embed security controls in cloud SLAs. IEEE. pp. 118-125.

Hendre, A., & Joshi, K. P. (2015). A semantic approach to cloud security and compliance. IEEE. pp. 1081-1084.

IBM, (2017). The built-for-AI, expertly architected-from-the-ground-up for business cloud. Available at https://www.ibm.com/cloud-computing/. Accessed on May 24, 2017.

Kandira, M., Mtsweni, J., & Padayachee, K. (2013). Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities. IEEE. pp. 653-658.

Katsuno, Y., Kundu, A., Das, K. K., Takahashi, H., Schloss, R., Dey, P., & Mohania, M. (2016). Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud. IEEE. pp. 359-366.

Khan, K. M., & Bai, Y. (2013). Automatic verification of health regulatory compliance in cloud computing. IEEE. pp. 719-721.

Majumdar, S., Madi, T., Wang, Y., Jarraya, Y., Pourzandi, M., Wang, L., & Debbabi, M. (2015). Security compliance auditing of identity and access management in the cloud: application to OpenStack. IEEE, pp. 58-65. 

Microsoft Azure, (2017). Deploy anywhere with your choice of tools. Available at https://azure.microsoft.com/en-in/overview/what-is-azure/. Accessed on May 24, 2017.

Panorama Towers, (2017). Case Study: Panorama Towers Enhances Luxury High-Rise Condo Experience with State-of-the-Art Biometric Access Control. Available at http://www.entertechsystems.com/customers/case-studies/panorama-towers-rvnue-technologies/. Accessed on May 13, 2017.

Pant, N. and Parappa, S., (2013). Seeding the cloud in a secured way: Cloud adoption and security compliance assessment methodologies. IEEE. pp. 305-308.

Sarkar, M. K., & Kumar, S. (2016). A framework to ensure data storage security in cloud computing. IEEE. pp. 1-4.

Sarkar, M. K., & Kumar, S. (2016). Ensuring data storage security in cloud computing based on hybrid encryption schemes. IEEE. pp. 320-325.