121 research outputs found

    Data Security and Privacy in the Cloud

    Get PDF
    Relying on the cloud for storing data and performing computations has become a popular solution in today\u2019s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions. While bringing undeniable benefits to both data owners and end users accessing the outsourced data, moving to the cloud raises a number of issues, ranging from choosing the most suitable cloud provider for outsourcing to effectively protecting data and computation results. In this paper, we discuss the main issues related to data protection arising when data and/or computations over them are moved to the cloud. We also illustrate possible solutions and approaches for addressing such issues

    ENHANCING SECURITY AND PRIVACY IN THE CLOUD COMPUTING

    Get PDF
    ABSTRACT Cloud computing is current buzzword in the market. Security to this Service is an important issue. PKI (Public key Infrastructure), as a Service and its focus is to evaluate the possibility to deploy a Public Key Infrastructure as a Cloud service. This is interesting since more and more organizations are moving their services and infrastructure to the cloud to benefit from the possibilities and advantages of cloud services and avoid problems with having own infrastructures. It is also interesting since the cloud could utilize the distributed architecture of PKI and in this way increase the reliability and availability and decrease the response times for validation of certificates

    Information Security and Privacy in the Cloud of Healthcare Sector, and The Use of Miter Att&ck Framework to Keep the Healthcare Secure

    Get PDF
    With healthcare moving to the cloud, it is necessary to be concerned about the rising cyber-threats. The healthcare industry is one of the most targeted industries by cyber-criminals. This can be attributed to the weak security measures employed and the vast amounts of valuable data that the healthcare industry holds. To ensure that the healthcare industry is secure, this paper proposes the use of the MITRE ATT&CK framework. The MITRE ATT&CK framework presents the best possible way of staying ahead of the threat landscape by helping cyber-security experts understand adversaries\u27 thought processes. By understanding how attackers think and the techniques that they use to gain unauthorized access to IT systems, the healthcare industry can use this information to improve its security architecture. To collect data needed for the study, the qualitative research design will be utilized. Data will be gathered from multiple sources, and the information synthesized to understand how the healthcare industry can improve its security through the application of the MITRE ATT&CK framework

    The Interplay of IT Governance Mechanisms, Value and Performance: The Case of Cloud Computing Investment

    Get PDF
    Background: Digital acceleration coupled with unprecedented work disruption (e.g., a Pandemic) have amplified the need for mature IT governance practices to generate planned value from organizations\u27 digital investments. Although the pairwise relationship between mature governance practices, value derived from IT investments, and organizational performance have been examined previously, all three have rarely been simultaneously investigated. Therefore, this paper examines the role of value in the relationship between IT governance mechanisms and organizational performance. Method: A research model that comprehensively conceptualizes the governance mechanism construct is developed and validated. The model is examined using data collected from 250 United States organizations that have invested in cloud computing for over a year. Results: The results reveal that the value generated from an IT investment is germane to understanding the relationship between governance mechanisms and organizational performance. Specifically, the result explains that governance mechanisms help improve organizational performance through cost reduction in IT services, create agility through flexibility in technology service, strengthen IT security and privacy, and effectively redirect IT resources. The results show the more critical role of the relational mechanism and practices related to IT security and privacy in the cloud computing context. Conclusion: The study contributes to IS literature by providing a more unified conceptualization of governance mechanisms and theoretically establishing the importance of governance in effectively governing cloud computing. By providing a guideline to help organizations achieve more value from cloud computing, the study provides implications for practice. The findings empirically show the relational mechanism has the most critical role in creating value from cloud computing. The governance practices help bridge the gap between business and IT, gradual transformative change in the roles and responsibilities, control cloud expenses, security and privacy risks. The findings show that competency is more likely to be achieved from cloud computing investment

    Modern Methods in the Development of Education Using Cloud Computing Applications

    Get PDF
    The world is a big scientific and technological revolution, have had an impact on all aspects of life, he became Education demanding to search for new methods of teaching and models to meet the many challenges at the global level, including the increased demand for education with a reduction in the number of educational institutions, and increase the quantum informational in all branches of knowledge , appeared E-Learning to help the learner to learn at the place where he wants while preferences without the obligation to come to the classroom at specific times, Became the methodology and ways of educational and search for information and easily obtained and the acquisition of new knowledge through cloud computing applications
    corecore