The use of cloud technology in Corporate Information Systems

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 1

Abstract

For automation industry, Information Technology (IT) is an essential production factor, but also a major expense post. Because cloud computing promises to deliver IT services more flexibly and cost-efficiently, it for automation industry prospectively. However, given the high degree of regulation, concerns regarding security and compliance requirements arise. In this work, provide a theoretical analysis of security problems in the context of cloud computing. This analysis is complemented by the initial results of an ongoing case study concerning the practical relevance of these problems in the industry. The analysis confirms that security issues pose notable obstacles for the adoption of cloud computing in practice, but also points to appropriate countermeasures

Authors and Affiliations

Rufat Talibov, Zafar Jafarov

Keywords

Related Articles

Using Relational Database Model in Cloud Computing

The advent of digital systems for the production and transmission of information decisively influences human progress and represents the future in any field of social life. In order to survive, organizations must correla...

SW-SDF based privacy preserving data classification

The core objective of privacy preserving data mining is to preserve the confidentiality of individual even after mining. The basic advantage of personalized privacy preservation is that the information loss is very less...

Comparison Studies for Different Shortest path Algorithms

While technological revolution has active role to the increase of computer information, growing computational capabilities of devices, and raise the level of knowledge abilities, and skills. Increase developments in scie...

COMPRO-MOTO: An efficient approach for identifying compromised nodes in wireless sensor networks.

Wireless sensor networks (WSNs) are exposed and being attacked by opponents as they are randomly deployed in open environments. Opponents can extract confidential information like secret keys by inserting their own nodes...

VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS

Control architecture for resource allocation in satellite networks is proposed, along with the specification of performance indexes and control strategies. The latter, besides being based on information on traffic statis...

Download PDF file
  • EP ID EP650626
  • DOI 10.24297/ijct.v14i1.2131
  • Views 82
  • Downloads 0

How To Cite

Rufat Talibov, Zafar Jafarov (2014). The use of cloud technology in Corporate Information Systems. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(1), 5352-5356. https://europub.co.uk./articles/-A-650626