IIUM Repository

Aligning cloud computing security with business strategy

Mohamed Hassan El-Hoby, Hany and A. F. Salah, Mohammed and Suhaimi, Mohd Adam (2014) Aligning cloud computing security with business strategy. International Journal of Computer Trends and Technology (IJCTT), 7 (1). pp. 52-60. ISSN 2349-0829 E-ISSN 2231-2803

[img]
Preview
PDF
Download (183kB) | Preview

Abstract

These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be helpful for an enterprise. It emphasizes on how cloud computing can be adopted in the IT sector. The paper also discusses the security issues of cloud computing. This article also highlights the issue of data leakage in this technology which faces cloud computing clients. The authors have designed a model to solve this issue through data isolation. A business value will be achieved through the proposed model by aligning the cloud computing security with the business strategy and increase the security procedures to verify the authenticated users through the virtual system.

Item Type: Article (Journal)
Additional Information: 1394/72057
Uncontrolled Keywords: Aligning Business/ IT goal, cloud computing, security, Privacy
Subjects: T Technology > T Technology (General)
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System

Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Professor Mohd Adam Suhaimi
Date Deposited: 13 May 2019 13:00
Last Modified: 13 May 2019 13:00
URI: http://irep.iium.edu.my/id/eprint/72057

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year