Mohamed Hassan El-Hoby, Hany and A. F. Salah, Mohammed and Suhaimi, Mohd Adam (2014) Aligning cloud computing security with business strategy. International Journal of Computer Trends and Technology (IJCTT), 7 (1). pp. 52-60. ISSN 2349-0829 E-ISSN 2231-2803
|
PDF
Download (183kB) | Preview |
Abstract
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be helpful for an enterprise. It emphasizes on how cloud computing can be adopted in the IT sector. The paper also discusses the security issues of cloud computing. This article also highlights the issue of data leakage in this technology which faces cloud computing clients. The authors have designed a model to solve this issue through data isolation. A business value will be achieved through the proposed model by aligning the cloud computing security with the business strategy and increase the security procedures to verify the authenticated users through the virtual system.
Item Type: | Article (Journal) |
---|---|
Additional Information: | 1394/72057 |
Uncontrolled Keywords: | Aligning Business/ IT goal, cloud computing, security, Privacy |
Subjects: | T Technology > T Technology (General) |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Information System Kulliyyah of Information and Communication Technology > Department of Information System Kulliyyah of Information and Communication Technology Kulliyyah of Information and Communication Technology |
Depositing User: | Professor Mohd Adam Suhaimi |
Date Deposited: | 13 May 2019 13:00 |
Last Modified: | 13 May 2019 13:00 |
URI: | http://irep.iium.edu.my/id/eprint/72057 |
Actions (login required)
View Item |