Wu He, Gongjun Yan, & Li Da Xu. (2014). Developing Vehicular Data Cloud Services in the IoT Environment. IEEE Transactions on Industrial Informatics, 10(2), 1587–1595. http://doi.org/10.1109/TII.2014.2299233 The authors presented a multilayered approach to protect the vehicular data using the cloud platform and IoT technologies. The IoT platform’s functional, performance, and security requirements for hosting vehicular data in cloud based IoT platforms were discussed. The gaps in the existing security encryption algorithms and performance requirements were enumerated. The gaps mentioned in this article are already discussed in existing literature and no new findings were presented in this article in terms of security gaps, threats, vulnerabilities and mitigation strategies to develop a counter measures. Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65–78. http://doi.org/10.1016/j.cose.2015.05.012 The authors described characteristics of cloud computing system and its attributes in terms of functionality, scalability, reliability, and security. Authors presented the need of synchronization between technology, human intervention and human behavior to build a secured cloud platform. The authors used their research study using qualitative and quantitative methods similar to a mixed method. The authors did not discuss any limitations
Won, S., Hong, R. A., Shohet, R. V., Seto, T. B., & Parikh, N. I. (2013).
This case gives us a fundamental understanding of the concept of cloud computing and presents the advantages and issues of this IT infrastructure. This case gives a clear vision of the company’s current situation. Three main questions to consider
Smith, R. J., Kilaru, A. S., Perrone, J., Paciotti, B., Barg, F. K., Gadsden, S. M., & Meisel, Z. F.
Sahoo, K., Sahoo, B., Choudhury, A. K., Sofi, N. Y., Kumar, R., & Bhadoria, A. S. (2015).
Cloud computing Ananda Gowri Sankar Krishna Mangena Wilmington university SEC-6040 October 13 2014 Instructor-Dr.Deval Shah TABLE OF CONTENTS: 1. Introduction...................................................................................................... 4 2.Technologies..................................................................................................... 4 2.1 Virtualization..............................................................................................4 2.2 Service oriented architecture......................................................................
However, research focusing on the adoption of cloud computing technology and its impact on business operation is limited. This trend may be explained by cloud computing being a relatively new field. Available research on the structures, processes, security measures surrounding the cloud services are still at an early stage.
Steeg, S., Haigh, M., Webb, R. T., Kapur, N., Awenat, Y., Gooding, P., & ... Cooper, J. (2016).
Blanchard, J., Madden, J. M., Ross-Degnan, D., Gresenz, C. R., & Soumerai, S. B. (2013). The
J., Courtens, A. M., Zwakhalen, S. G., van Kleef, M., & de Witte, L. P. (2015).
Chartier, K.G., Scott, D.M., Wall, T.L., Covault, J., Karriker-Jaffe, K.J., Mills, B.A. Luczak, S.E., Caetano, R., & Arroyo, J.A. (2014).
Services such as, data storage and security, are provided by cloud computing over the internet. In cloud computing, users can pay for what they consume (Bisong & Rahman, An Overview of the Securtiy Concerns in Enterprise Cloud Computing, 2011). Cloud computing is an emerging information technology, which can make it easier for the users to manage their data. Cloud computing allows businesses to expand as new cloud-based models are being discussed and implemented as solutions (Bamiah & Brohi, 2011).
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
Vehicle Cloud Computing is a new hybrid technology consists of the combination of various networks such as mobile adhoc networks, wireless sensor networks, vehicular adhoc networks, and cloud computing to provide better services for automatic cars such as control car movements and handling navigation system to provide reliable and shorter routes,which also ensures safety. Security and privacy are the two major challenges for all wireless or wired networks that allow users to share the same set of resources. The architecture of VCC can be classified into three layers: networks ,the wireless communication channel and cloud computing. The first part is responsible for collecting the
Despite of the large scale adoption of cloud computing, there are numerous issues that are inherent in these systems including unreliable level of latency and issues related to mobility. These problems and challenges can be overcome through adoption of fog computing. It can provide elastic resources and services to end users. The present research addressed the definitions of fog computing, application scenarios, quality of service, capacity, storage, security and privacy, reliability and issues in terms of these dimensions of fog computing. A number of challenges and opportunities in the large scale adoption of fog computing have also been highlighted. The present study has also made a number of futuristic recommendations and proposals. It is through overcoming the challenges and problems identified in fog computing that its adoption and implementation can be improved.