Aligning Cloud Computing Security with Business Strategy

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1

Abstract

These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be helpful for an enterprise. It emphasizes on how cloud computing can be adopted in the IT sector. The paper also discusses the security issues of cloud computing. This article also highlights the issue of data leakage in this technology which face the cloud computing clients. The authors have designed a model to solve this issue through data isolation. A business value will be achieved through the proposed model by aligning the cloud computing security with the business strategy and increase the security procedures to verify the authenticated users through the virtual system.

Authors and Affiliations

Hany Mohamed Hassan El - Hoby , Mohammed A. F. Salah , Prof . D r . Mohd Adam Suhaimi

Keywords

Related Articles

Minimizing Spurious Patterns Using Association Rule Mining

Most of the clustering algorithms extract patterns which are of least interest. Such pattern consists of data items which usually belong to widely different support levels. Such data items belonging to different support...

Intensity and Texture Gradient Based Boundary Detection Algorithm for Medical Image[i][/i]

In today’s technological world images plays a very important role. Images are very helpful in several fields like non-destructive testing. Medical diagnostics, surveillance and military etc. in image analysis and compute...

A Study on Big Data Integration with Data Warehouse

The amount of data in world is exploding. Data is being collected and stored at unprecedented rates. The challenge is not only to store and manage the vast volume of data, but also to analyze and extract meaningful value...

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted...

Energy Based Optimal Relaying in Heterogeneous Radio Access Networks

Due to recent trends in mobile communication system, much attention has be given to heterogeneous networks in which a mobile equipment is able to access multiple networks that are present in a locality. Here each random...

Download PDF file
  • EP ID EP126093
  • DOI -
  • Views 137
  • Downloads 0

How To Cite

Hany Mohamed Hassan El - Hoby, Mohammed A. F. Salah, Prof . D r . Mohd Adam Suhaimi (2014). Aligning Cloud Computing Security with Business Strategy. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 7(1), 52-60. https://europub.co.uk/articles/-A-126093