Aligning Cloud Computing Security with Business Strategy

  IJCTT-book-cover
 
International Journal of ComputerTrends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-7 Number-1                          
Year of Publication : 2014
Authors : Hany Mohamed Hassan El-Hoby , Mohammed A. F. Salah , Prof. Dr. Mohd Adam Suhaimi.
DOI :  10.14445/22312803/IJCTT-V7P125

citation

 

Hany Mohamed Hassan El-Hoby , Mohammed A. F. Salah , Prof. Dr. Mohd Adam Suhaimi. Article: Aligning Cloud Computing Security with Business Strategy. International Journal of Computer Trends and Technology (IJCTT) 7(1):52-60, January 2014. Published by Seventh Sense Research Group.

Abstract
- These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be helpful for an enterprise. It emphasizes on how cloud computing can be adopted in the IT sector. The paper also discusses the security issues of cloud computing. This article also highlights the issue of data leakage in this technology which face the cloud computing clients. The authors have designed a model to solve this issue through data isolation. A business value will be achieved through the proposed model by aligning the cloud computing security with the business strategy and increase the security procedures to verify the authenticated users through the virtual system.

References
1- Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Konwinski, A., & Zaharia, M., (2010). A view of Cloud Computing. Communications of the ACM, 53 (4), 50-58.
2- Low, C., Chen, Y., & Wu, M. (2011). Understanding the determinants of cloud computing adoption. Industrial Management & Data Systems, 111(7), 1006–1023.
3- Barber, H. H., Lawler, J., Desai, S., & Joseph, A. (2012). A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms. Education special interest group of the AITP, 5(2205), 1–14.
4- Joseph, A., Kim, P., & Wu, P. (2013). Information Systems Applied Research Special Issue: Cloud Computing In this issue, 6(3), 1–33.
5- Bisong, A. (2011). AN OVERVIEW OF THE SECURITY CONCERNS IN, 3(1), 30–45. 6- Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-Preserving Public Auditing for Secure Cloud Storage. Institute of Electrical and Electronics Engineers (IEEE), 62 (2), 1–12.
7- Wang, C., Wang, Q., Ren, K., & Lou, W., (2009). Ensuring data storage security in Cloud Computing. International Workshop on Quality of Service, 1–9.
8- Ming, T., & Yongsheng, Z., (2012). Analysis of Cloud Computing and Its Security. Information Technology in Medicine and Education (ITME), 1, 379–381.
9- Hamouda, S., (2012). Security and privacy in cloud computing. Cloud Computing Technologies, Applications and Management (ICCCTAM), 241–245.
10- Zissis, D., & Lekkas, D., (2012). Addressing cloud computing security issues. Future Generation Computer Systems,28(3),583–592.
11- Teece, D. J. (2010). Business Models, Business Strategy and Innovation. Long Range Planning, 43(2-3), 172–194.
12- Jansen, W. a., (2011). Cloud Hooks: Security and Privacy Issues in Cloud Computing. Hawaii International Conference on System Sciences, 1–10.
13- Van, G. W., & De, H. S. (2008). Enterprise governance of information technology: Achieving strategic alignment and value. New York: Springer.
14- Edwards, J. (2009). Cutting through the fog of cloud security. Computerworld. Framingham: 43, (8), 3-26
15- Francis, T., & Vadivel, S. (2012). Cloud computing security: Concerns, strategies and best practices. Cloud Computing Technologies, Applications and Management (ICCCTAM), 205–207.

Keywords Aligning Business/ IT goal, cloud computing, security, Privacy.