Impact of Security Issues in Cloud Computing Towards Businesses

By | August 11, 2018

Bader Methqal AlFawwaz
Department of Computer Information Systems, Al al-Bayt University, Jordan.

Abstract—Cloud computing structures allow businesses to save expenses by subcontracting computer related activities on-demand. However, customers of cloud computing facilities presently have no sources for authenticating privacy and reliability of their confidential data. Cloud servers are skillful of managing large quantities of shapeless data to support recognizing, improving and then making new planned business prospects. Company’s administrators recognize that appropriate and precise information can turn out to be enhanced business performance. These days’ cloud tools are dominant in enlightening the qualitative and quantitative worth of the confidential data presented to executives of the organizations. In this paper, we debate that apprehensions about the privacy and reliability of their data and other electronic material are a main restrictive factor for company’s desire to adapt cloud-computing facilities. The concept of passing over confidential information to a third party is troublesome, this ultimately means that the customers need to be attentive in accepting the threats of data breaks in this novel situation. The methodology of this paper is based on literature analysis. For results, researcher has studied published work on cloud computing security and how these issues leading companies having loss in business. Further, this research presents a thorough study of the cloud computing safety problems and experiments concentrating on the cloud computing categories and the service supply kinds. The research is helpful for those company managers, owners, policy makers and decision makers, which are mostly dependent on the cloud services while taking decisions.

Keywords- IT Auditor; Object Oriented Model; Internal Auditor; Education Institute; Accounts Auditing; UML.

Citation: Bader Methqal AlFawwaz, “Impact of Security Issues in Cloud Computing Towards Businesses”, The World of Computer Science and Information Technology Journal (WSCIT). 2017 Volume 7, Issue 1. pp. 1.6.

2017, Volume 7, Issue 1.

REFERENCES
[1]Almudawi, N. A. (2016) ‘Cloud Computing Privacy Concerns in Social Networks’, International Journal of Computer (IJC), Vol 22, No 1, pp 29-36.
[2]Buyya, R. , Broberg, J. and Goscinski, A (2011) ‘Cloud Computing Principles and Paradigms’, A John Wiley & Sons Inc, Hoboken, New Jersey.
[3]Srinivasan, S (2014) Cloud computing basics. New York: Springer.
[4]Williams, M. I (2010) A quick start guide to cloud computing: Moving your business into the cloud. London: Kogan Page.
[5]Ivanov, I., Sinderen, M. J., Leymann, F., and Shan, T (2013) Cloud Computing and Services Science: Second International Conference, CLOSER 2012, Porto, Portugal, April 18-21, 2012, revised selected papers. Cham: Springer.
[6]Wang, L. Ranjan, R. Chen, J. and Benatallah, B (2012) ‘Cloud Computing: Methodology, Systems, and Applications’, CRC Press, Taylor and Francis Group.
[7]Paul, M (2012) ‘The 7 qualities of highly secure software’, Boca Raton, FL: CRC Press, Taylor and Francis Group.
[8]Usman. M., Jan. A and He. A (2016) ‘Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds’, Elsevier Information sciences, accepted, 2016.
[9]Halpert, B (2011) ‘Auditing cloud computing: A security and privacy guide’, Hoboken, N.J: John Wiley & Sons.
[10]ISACA (Information Systems Audit and Control Association) (2011) ‘IT control objectives for cloud computing: Controls and assurance in the cloud’, Rolling Meadows, USA.
[11]Jamsa, K (2013) ‘Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington’, MA: Jones & Bartlett Learning.
[12]Das, S. K., Kant, K., and Zhang, N (2012) ‘Handbook on securing cyber-physical critical infrastructure’, Waltham, MA: Morgan Kaufmann.
[13]Park, J. J., Chao, H., Obaidat M. S, and Kim. J (2011) ‘Computer science and convergence: CSA 2011 & WCC 2011’, Proceedings. Dordrecht, New York: Springer.
[14]Jayalekshmi MB, Krishnaveni SH (2015) ‘A Study of Data Storage Security Issues in Cloud Computing’, Indian Journal of Science and Technology. 2015 Sep; 8(24)
[15]Sumit Goyal (2014) ‘Public vs Private vs Hybrid vs Community – Cloud Computing: A Critical Review’, I.J. Computer Network and Information Security, 2014, 3, 20-29
[16]Nick. A and Lee. G (2010) ‘Cloud Computing Principles, Systems and Applications’, London: Springer, 2010
[17]Buyya. R, Vecchiola. C, and Selvi. S. T (2013) ‘Mastering Cloud Computing: Foundations and Applications Programming’, Morgan Kaufmann. .
[18]Dhamdhere, S. N (2013) ‘Cloud computing and virtualization technologies in libraries’. Hershey, PA: IGI Global.
[19]Grandinetti, L., Pisacane, O., and Sheikhalishahi, M (2014) ‘Pervasive cloud computing technologies: Future outlooks and interdisciplinary perspectives’, Hershey PA: IGI Global.
[20]Moumtzoglou, A., and Kastania, A (2014) ‘Cloud computing applications for quality health care delivery’, Hershey, PA: IGI Global, 2014.

Leave a Reply

Your email address will not be published. Required fields are marked *