Security Challenges of Cloud Computing For Enterprise Usage and Adoption
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Cloud computing has brought about a paradigm shift in Information Technology services globally most especially in developed countries for mid-sized to large scale enterprises. It has emerged as one of the major IT trends of the 21st century. Cloud computing simply refers to the process of storing and accessing data and applications over the internet in a remote location instead of the localhard drive storage. This has brought about so many advantages in business and has helped improved productivity in the organization; cost-efficiency, scalability, easy access to information, unlimited storage and flexibility are also some of the benefits. However, several challenges abound with the use of cloud computing. Despite the numerous benefits it offers, Security threats and risk stands out as a major constraint for organizations. This paper examines some of the benefits of cloud computing and the challenges in the enterprise environment and factors militating against its full adoption.It focuses more on the security challenges that includes data protection, privacy, security standardsas well as network attacks
Authors and Affiliations
Folusho Abayomi Oyegoke
Research on Clustering Method of Related Cases BasedOn Chinese Text
Abstract: With the movement of population, crimes are showing mobility and professionalism characteristics,the cases which the same suspects committed have the same or similar characteristics, it is helpful to find...
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security a...
Analysis of Bus Tracking System Using Gps on Smart Phones
Abstract: Public transport networks (PTNs) are difficult to use when the user is unfamiliar with the area they are traveling to. This is true for both infrequent users (including visitors) and regular users who need to t...
Automatic test data generation for time-continuous embedded system using built-in signals
Nowadays, embedded systems are becoming critical applications and play important roles in modern society. Therefore, quality assurance for these types of systems has attracted many attentions in software engineering rese...
Privacy Protection in Distributed Industrial System
Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense)can be exposed to serious cyber threats, many people still think that the same countermeasures, developed...