ABSTRACT

The US Federal Government regulation on protecting private information is called the Federal Information Security Management Act of 2002 (FISMA). FISMA lays out rules, developed by the National Institute for Science and Technology for protecting information. The security profile is tied to the identity but also needs to be correlated with physical location awareness. Location Aware—Hardware or software that uses any of several techniques to determine its geographic location. The entire notion of location-aware computing rose across a number of different computing areas roughly simultaneously; an example of a different application of the technology is Geotargeting for Internet marketing. Cloud computing comes down to everything being available from remote locations. Cloud security might be a shiny new model, but it is based upon tried and true methodologies with reasonable and logical extensions that deal with the cloud’s unique issues.