TITLE

ISSUES REGARDING SECURITY PRINCIPLES IN CLOUD COMPUTING

AUTHOR(S)
GEORGESCU, Mircea; SUICIMEZOV, Natalia
PUB. DATE
July 2012
SOURCE
USV Annals of Economics & Public Administration;2012, Vol. 12 Issue 2, p221
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The introduction of Cloud Computing creates a wave of reluctance for specialists representing the information security field. This reluctance comes from end users as well, who think data stored on an internal infrastructure are much safer than those held on the servers of potential providers, and also from governments that apply different policies at the national level regarding the security of personal data. Non-acceptance and reluctance of cloud technologies also come from the impact of changing perceptions about infrastructure architectures, development and application delivery models that the emergence of these technologies had led to. Many of the technologies used for traditional security issues are no longer effective in the cloud. Meanwhile, other solutions were developed to put more focus on Governance in the Cloud. To successfully manage and ensure the efficiency and effectiveness of information technologies as a corporate resource, organizations have turned to what is IT governance. Rapid transition to cloud technologies fuel a critical issue regarding the success of information systems, communication and information security. As a consequence, the paper aims to identify, evaluate and clarify information security in the Cloud using three principles of security (Confidentiality, Integrity and Availability) and to emphasize the importance of Governance in Cloud Computing at the business level.
ACCESSION #
87522765

 

Related Articles

  • Privacy and Security in the Cloud. Gupta, Navneet // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1839 

    Cloud computing, undoubtedly, has become the buzzword in the IT industry today. It holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture,...

  • AN APPROACH TO PERSONALIZED SEARCH WITHIN DISTRIBUTED REPOSITORY OF VISUAL DATA. GLOWACZ, Andrzej; ORZECHOWSKI, Tomasz Marcin; DZIECH, Andrzej // Advances in Electrical & Electronic Engineering;Special Issue 2012, Vol. 10 Issue 4, p312 

    In this paper, we introduce functional assumptions of the distributed repository of visual data that are one of key aspects of SYNAT framework for digital libraries. The proposed system will provide innovative tools and extend capabilities of current repositories. Within this task, the...

  • Conceptualizing Individualization in Information Systems -- A Literature Review. Gaß, Oliver; Ortbach, Kevin; Kretzer, Martin; Maedche, Alexander; Niehaves, Björn // Communications of the Association for Information Systems;Jul2015, Vol. 37, p64 

    Driven by advances in information and communication technology, end users nowadays operate extensive information systems to support all kinds of private and professional activities. Previous IS research has coined various terms to refer to this rather new phenomenon. Some scholars call it...

  • Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage. Arockiam, L.; Monikandan, S.; Malarchelvi, P. D. Sheba K. // International Journal of Computer Applications;Feb2014, Vol. 88, p17 

    In today's IT industry, the more sophisticated data storage is cloud storage. Cloud storage mainly helps Small and Medium scale Enterprises (SMEs) to reduce their investments and maintenance of storage servers. Most of SMEs are outsourcing their data to cloud storage. Users' data that are sent...

  • Investigating ERP systems success from the end user perspective. Stefanovic, Darko; Mirkovic, Milan; Anderla, Andras; Drapsin, Miodrag; Drid, Patrik; Radjo, Izet // TTEM- Technics Technologies Education Management;2011, Vol. 6 Issue 4, p1089 

    Today no one would dispute that enterprise software (e.g. ERP system) has become important cornerstone of an enterprise's ability to successfully compete in the global marketplace. Different strategic intentions of implementing ERP systems affect the effectiveness aspects at the stage of...

  • RECYCLE BIN WOES.  // APC (Bauer Media Group);Apr2011, Vol. 31 Issue 4, p20 

    The article discusses the cases of several computer users who were caught after their illegal activities were recovered from their computer's recycle bin. It states that several end users forget to remove evidences of their illegal activities before sending their computers to repair shops and...

  • Energy-efficient replica detection for resource-limited mobile devices in the internet of things. Kwantae Cho; Byung-Gil Lee; Kyungho Lee; Dong Hoon Lee // IET Communications;2013, Vol. 7 Issue 18, p2141 

    The forthcoming Internet of Things - an intelligent collaboration of resource-limited static/mobile devices that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is how to thwart replica attacks. Once a device...

  • Design and Implementation of an Open-Source Computer-Based Testing System with End User Impact Analysis in Africa. Oluwole, Oyetoke // International Journal of Modern Education & Computer Science;Aug2015, Vol. 7 Issue 8, p17 

    The System is a Java Desktop Application designed by the integration of Java and MySQL to help provide a platform whereby computer-based tests can be organized and performed. The basic idea behind designing the system to have a fluid outlook and functional over a Wi-Fi network is simply to offer...

  • Internet finance system based on acceptance model. Ke Liu; Hong Jun Zhang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p2313 

    Acceptance Model(AM) is a pragmatic approach to forecast whether users will accept the new information technology or not. The basic principle of AM is described, and the relationship between Internet finance system and user's behavior is analyzed. In a form of case, the continuous development of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics