logo

Cloud Computing Adoption Framework: A Security Framework for Business Clouds

   

Added on  2022-12-19

8 Pages1744 Words83 Views
NETWORKING 0
Cloud Computing
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption
framework: A security framework for business clouds.
Future Generation
Computer Systems,
57(7), 24-41.
Cloud Computing Adoption Framework: A Security Framework for Business Clouds_1
NETWORKING 1
Summary of the article
The title of the selected paper is “Cloud computing adoption
framework: A security framework for business clouds” which was written by
Victor and other authors in the year 2016. This journal article is based on
the cloud computing framework in which the researchers reviewed a
security framework for business clouds. The key goal of this paper is the
elaborate cloud computing framework for business clouds and analyzes
security related issues linked with cloud computing (Chang, Kuo &
Ramachandran, 2016). According to the researchers, CCAF is based on the
integration and development of three security techniques for example
firewall, encryption technique and identity management.
This research paper presents the theoretical framework related to
cloud computing and evaluates the key aspects of cloud computing
(Alshamaila, Papagiannidis, & Li, 2013). The authors examined that privacy
and security remain key issues for companies that use cloud computing and
other information technologies. The previous investigation adopted a
framework process which enables the companies to follow guidance,
standards and policies. Moreover, the authors also reviewed the viewpoints
of other experts by conducting a literature review in the study (Borgman,
Bahli, Heier, & Schewski, 2013). There are numerous sections covered by
the researchers, for example, core technologies, architecture and design of
the security networks, multilayered security and so on.
It is argued that firewall and encryption both are effective techniques
which can be used in the companies for controlling and addressing security
concerns related to cloud computing. In this investigation, the authors
explained the mechanism of CCAF multilayered security with real service,
policy and business activities linked with cloud computing. The authors
examined that the CCAF is mainly developed and implemented for meeting
the requirements of business clouds and ensure that all provided services
Cloud Computing Adoption Framework: A Security Framework for Business Clouds_2
NETWORKING 2
and networks provide the effective results (Gangwar, Date, & Ramaswamy,
2015). From the literature search, it is observed that the authors reviewed
and evaluated more than 15 journal articles and also examined the impacts
of cloud computing on business.
It is argued that the utilization based authentication is one of the best
architecture used by the companies for controlling and reducing the rate of
security threats while using cloud-based services in the workplace. The
authors also included prototype system architecture for better
understanding of the key aspects of cloud computing (Nkhoma, Dang, & De,
2013). For providing enterprises with convenient cloud servers compliance
and regulation were included in the cloud networks that effectively manage
the entire process.
Therefore, it is observed that the authors provided reliable facts and
data related to cloud computing and also evaluated the core technologies
used with cloud networks for improving the performance of the business.
This research papers examined the key features of cloud computing
adoption framework and evaluate the security-related concerns linked with
the business clouds.
Critical review
The author selected cloud computing topic for the investigation
because it is an advanced technology which is growing rapidly and this
proposed research may help the readers for enhancing skills in the area of
cloud computing. It is argued that there are numerous EFSS security issues
linked with cloud computing, for example, employee privacy, share the link,
cloud file synchronization, enterprise directory integration and so on (Hsu,
Ray, & Li-Hsieh, 2014). This research paper provided a comparative
analysis on the cloud computing and identified that lack of privacy and
involvement of unauthorized networks both are common factors linked with
Cloud Computing Adoption Framework: A Security Framework for Business Clouds_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud computing adoption framework: A security framework for business clouds
|18
|17028
|244

Cloud Computing Adoption Framework for Business Clouds: A Multi-Layered Security Approach
|33
|17004
|252

Cloud Computing Adoption Framework for Business Clouds: A Multi-Layered Security Approach
|33
|17004
|408

Adoption of Cloud Computing
|12
|2951
|100

Cloud computing.
|7
|431
|44

Research Outline - Issues in Cloud Computing
|5
|1021
|14