Abstract :
In part I, the author briefly introduced cloud computing and a model of it that has seven layers (facility, network, hardware, OS, middleware, application, and the user). Each cloud computing deployment must have these layers, but different deployment types give control of them to different parties. Here, the author covers controls that could be implemented in the middleware, application, and user layers to monitor and audit information assurance.
Keywords :
cloud computing; middleware; security of data; cloud computing monitoring; information assurance; middleware; Cloud computing; Computer architecture; Computerized monitoring; Monitoring; Protocols; cloud computing; computer networks; computer security; infrastructure as a service; middleware; network security; platform as a service; software as a service;