Issues Regarding Security Principles In Cloud Computing
AbstractThe introduction of Cloud Computing creates a wave of reluctance for specialists representing the information security field. This reluctance comes from end users as well, who think data stored on an internal infrastructure are much safer than those held on the servers of potential providers, and also from governments that apply different policies at the national level regarding the security of personal data. Non-acceptance and reluctance of cloud technologies also come from the impact of changing perceptions about infrastructure architectures, development and application delivery models that the emergence of these technologies had led to. Many of the technologies used for traditional security issues are no longer effective in the cloud. Meanwhile, other solutions were developed to put more focus on Governance in the Cloud. To successfully manage and ensure the efficiency and effectiveness of information technologies as a corporate resource, organizations have turned to what is IT governance. Rapid transition to cloud technologies fuel a critical issue regarding the success of information systems, communication and information security. As a consequence, the paper aims to identify, evaluate and clarify information security in the Cloud using three principles of security (Confidentiality, Integrity and Availability) and to emphasize the importance of Governance in Cloud Computing at the business level.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Stefan cel Mare University of Suceava, Romania, Faculty of Economics and Public Administration in its journal The USV Annals of Economics and Public Administration.
Volume (Year): 12 (2012)
Issue (Month): 2(16) (December)
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Liviu Scutariu).
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.