SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 1

Abstract

: Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effective manner. Cloud Computing is a way of providing and consuming IT Services. Cloud computing constitutes the biggest IT advance in years and touches on just about every facet of the enterprise. Topics can include development platforms, software/applications, service level agreements, enterprise security, outsourcing, Big Data, storage, Shadow IT, compliance and governance. Cloud computing is currently the most over-hyped and least understood technological innovation since the advent of the Internet. The latter tremendously impacted businesses of all sizes globally, and the former has the potential to similarly and dramatically transform the business and economics of IT over the next few years. The cloud is enabling new ways for IT to operate and is helping organizations to define a new, more collaborative relationship between IT and the business. Increasingly, IT leaders view cloud computing as a catalyst for change and are using it for IT or business transformation. The concept of cloud computing creates new challenges for security, because sensitive data may no longer reside on dedicated hardware. On the contrary, there are also potential security benefits of Cloud Computing.

Authors and Affiliations

Subramanian Anbazhagan, Somasundaram K

Keywords

Related Articles

A LITERATURE STUDY ON ASSOCIATION RULE MINING

Association Rule mining has become an essential topic in data mining during recent years. It gains more popularity because of its wide range of applicability. Many researches introduced new algorithms ba...

Survey on Data Mining Classification Techniques to Predict Diabetes

This paper surveys on Data mining classification methods on CPCSSN dataset to etect diabetes. Data mining serves as the main application area to derive meaningful information from the humongous data that is accessible ev...

NFC SIGNALS BASED ON AN EFFECTIVE MOBILE ROBOT LOCALIZATION

A Complete Localization system for an indoor self - ruled vehicle equipped with Near Field Communication (NFC) reader to Interrogate tags located on the environment. Phase Measurement for real t...

DESIGN OF LOW POWER 32-BIT CSKA FOR HIGH SPEED APPLICATIONS

Research in Very Large Scale Integration (VLSI) based design of Integrated Circuits (IC) addresses the issues of power, area and time consumption by the components used. These violates the spee...

AN EFFICIENT HIGH SPEED VCS UPDATION BASED MESH TOPOLOGY NOC ROUTER ARCHITECTURE DESIGN

Network-on-Chip (NoC) architectures signify a capable design paradigm to cope with raising communication requirements in digital systems. It emerged as a vital factor that defines the presentation and power consumption o...

Download PDF file
  • EP ID EP362804
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Subramanian Anbazhagan, Somasundaram K (2014). SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS. Elysium Journal of Engineering Research and Management, 1(1), 46-52. https://europub.co.uk/articles/-A-362804