Security Challenges of Cloud Computing For Enterprise Usage and Adoption
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Cloud computing has brought about a paradigm shift in Information Technology services globally most especially in developed countries for mid-sized to large scale enterprises. It has emerged as one of the major IT trends of the 21st century. Cloud computing simply refers to the process of storing and accessing data and applications over the internet in a remote location instead of the localhard drive storage. This has brought about so many advantages in business and has helped improved productivity in the organization; cost-efficiency, scalability, easy access to information, unlimited storage and flexibility are also some of the benefits. However, several challenges abound with the use of cloud computing. Despite the numerous benefits it offers, Security threats and risk stands out as a major constraint for organizations. This paper examines some of the benefits of cloud computing and the challenges in the enterprise environment and factors militating against its full adoption.It focuses more on the security challenges that includes data protection, privacy, security standardsas well as network attacks
Authors and Affiliations
Folusho Abayomi Oyegoke
Semantic Web Service Discovery Using Sense Match Making
Semantic Web Service is an emerging technology which is growing popularly, due to the increased level of machine understandability. In this paper we propose semantic web service discovery framework using Sense ba...
A B-S Model for Online Integrated Information System for Bayero University Kano Nigeria
Abstract : An online integrated information system for Bayero University Kano, is a web-based application that provides inputs and outputs information support to admin/users in order to access and update university...
Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator
Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extende...
Secure Image Hiding Algorithm using Cryptography and Steganography
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and ste...
Performance Analysis of Three Hop Reliability Model forWireless Sensor Networks in Nuclear Power Plants
Abstract: Wireless sensor networks(WSN) are a good choice for Nuclear Power Plants because of low costand flexibility. Reliability is a crucial factor for WSN in Nuclear Power Plants since all the data collected aretime...