SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 1

Abstract

: Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effective manner. Cloud Computing is a way of providing and consuming IT Services. Cloud computing constitutes the biggest IT advance in years and touches on just about every facet of the enterprise. Topics can include development platforms, software/applications, service level agreements, enterprise security, outsourcing, Big Data, storage, Shadow IT, compliance and governance. Cloud computing is currently the most over-hyped and least understood technological innovation since the advent of the Internet. The latter tremendously impacted businesses of all sizes globally, and the former has the potential to similarly and dramatically transform the business and economics of IT over the next few years. The cloud is enabling new ways for IT to operate and is helping organizations to define a new, more collaborative relationship between IT and the business. Increasingly, IT leaders view cloud computing as a catalyst for change and are using it for IT or business transformation. The concept of cloud computing creates new challenges for security, because sensitive data may no longer reside on dedicated hardware. On the contrary, there are also potential security benefits of Cloud Computing.

Authors and Affiliations

Subramanian Anbazhagan, Somasundaram K

Keywords

Related Articles

A LITERATURE STUDY ON ASSOCIATION RULE MINING

Association Rule mining has become an essential topic in data mining during recent years. It gains more popularity because of its wide range of applicability. Many researches introduced new algorithms ba...

ROBUST SCENE TEXT RECOGNITION WITH SPARSE BELIEF PROPAGATION

Content-based image analysis task requires text detection in natural scene images. The character candidates in text detection on minimizing regularized variations termed as Maximally Stable Extremely Regi...

SURVEY ON NETWORK DEFENCE SYSTEM [NDS] FOR CRYPTOGRAPHY AND HYBRID NETWORK SECURITY SYSTEM

Many computing systems have recently and preventing hacking is important in protecting business. Many significant security methodologies have been proposed to provide security between hacking. Fortunate...

SELECTION OF OPTIMAL MINING ALGORITHM FOR OUTLIER DETECTION - AN EFFICIENT METHOD TO PREDICT/DETECT MONEY LAUNDERING CRIME IN FINANCE INDUSTRY

Today, Money Laundering (ML) poses a serious threat and unique challenge to financial institutions. Most of the financial institutions internationally have been implementing Anti-Money Laundering solutions (AML) to fight...

FiDoop: Parallel Mining of Frequent Item sets Using MapReduce

Due to the exponential increase of real-time data monitoring systems, the extraction of frequent item (Frequent item set mining) set from large uncertain database is the challenging task. The existing parallel mining alg...

Download PDF file
  • EP ID EP362804
  • DOI -
  • Views 131
  • Downloads 0

How To Cite

Subramanian Anbazhagan, Somasundaram K (2014). SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS. Elysium Journal of Engineering Research and Management, 1(1), 46-52. https://europub.co.uk/articles/-A-362804