Cloud Provider Assurances
There has been wide acceptance of new technologies with the latest one being that of cloud computing. The answer provided for questions regarding the implementation of an authenticity assurance model and assurance of confidentiality is the right answer. Several models to solve the identified problem exists but the best suited is the Time-Bound Ticket-Based Mutual Authentication Model. The basic requirements for making cloud computing a success include the availability of an internet connection that is strong enough to handle the services to be delivered, some hardware and software infrastructure to be shared, the on-demand service, some metered use and a feedback and security means
The answer to question explains the operation of the model, thus bringing out the picture of how the model is best suited in solving the problem. Bidgoli (2011) explains other database security models in his book Handbook of information security. According to the author, models include access control matrix, discretionary security model, mandatory security models, adapted access control model and personal knowledge approach.
In the explanation, the model suits to handle a database where several users, as portrayed in the air ticket and reservation environment, access the database simultaneously. The authentication mechanism of the model reduces the security risk to the client data and information. This is achieved by mutual authentication between the server and client.
The model also offers more advantages to the processing and operation in the system; it increases efficiency and reduces the risk of unauthorized access thus providing confidentiality.
The maintenance of security of software components is stipulated in the NIST guidelines Special Publication 800-144 which is followed by airline reservation companies. The answer provided for this question also explains how the guidelines will ensure maintenance of the system security.
References
H, B. (2011). Handbook of Information Security: database security mechanisms and models. New York: John Wiley and Sons Inc.
Zhuo, H., Sheng, Z., & Neghai, Y. (2012). A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing . International Journal of Computers, communication and control , 5-10.