How Cloud Computing Aids Security Management in Modern Organizations
VerifiedAdded on 2021/04/16
|12
|2842
|68
Report
AI Summary
This report provides a comprehensive analysis of how cloud computing enhances security management in organizations. It explores various cloud computing models, including their advantages and pricing structures, as well as the critical role of cloud services in ensuring data transparency and security. The report delves into the challenges of handling big data within cloud environments, the importance of data integrity, and the need for scalable solutions. It examines cloud security risks, privacy issues, and incident handling strategies, highlighting the significance of security measures and the impact of cloud computing on IT strategies in both public and private sectors. The research references several studies that discuss cloud security, data privacy, and the advantages and challenges of cloud adoption from an enterprise perspective. Furthermore, it emphasizes the importance of addressing security weaknesses and implementing appropriate applications to secure cloud networks, along with the significance of privacy in cloud computing.

Running head: INFORMATION SYSTEM MANAGEMENT
Information System Management
Name of Student-
Name of University-
Author’s Note-
Information System Management
Name of Student-
Name of University-
Author’s Note-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INFORMATION SYSTEM MANAGEMENT
Topic: How does Cloud Computing help in managing the security in an
organization?
Mvelase, P., Sithole, H., Modipa, T., & Mathaba, S. (2016, November). The
economics of cloud computing: A review. In Advances in Computing and
Communication Engineering (ICACCE), 2016 International Conference on (pp.
159-167). IEEE.
There are many significant advantages in an organization that comes with the help of
cloud computing. Cloud computing helps to increase the efficiency of working, saves the cost,
accelerate the innovation of the organization, and it is user-friendliness and provides better
security for the company. The technology of cloud computing allows computing power to the
businesses. There are different types of computing model in cloud computing. This paper shows
different types of cloud computing models that can be used in businesses and compares all the
techniques of pricing models for the employees.
This paper clears the key attributes and concepts of cloud computing. A detailed
comparison is done in between all the models that are described, to help the business choose the
model.
This source helps to get a clear view on all the models of cloud computing that are of
different price models.
Topic: How does Cloud Computing help in managing the security in an
organization?
Mvelase, P., Sithole, H., Modipa, T., & Mathaba, S. (2016, November). The
economics of cloud computing: A review. In Advances in Computing and
Communication Engineering (ICACCE), 2016 International Conference on (pp.
159-167). IEEE.
There are many significant advantages in an organization that comes with the help of
cloud computing. Cloud computing helps to increase the efficiency of working, saves the cost,
accelerate the innovation of the organization, and it is user-friendliness and provides better
security for the company. The technology of cloud computing allows computing power to the
businesses. There are different types of computing model in cloud computing. This paper shows
different types of cloud computing models that can be used in businesses and compares all the
techniques of pricing models for the employees.
This paper clears the key attributes and concepts of cloud computing. A detailed
comparison is done in between all the models that are described, to help the business choose the
model.
This source helps to get a clear view on all the models of cloud computing that are of
different price models.

2INFORMATION SYSTEM MANAGEMENT
Schwarzbach, B., Franczyk, B., Petrich, L., Schier, A., & Ten Hompel, M.
(2016, December). Cloud Based Privacy Preserving Collaborative Business
Process Management. In Computer and Information Technology (CIT), 2016
IEEE International Conference on (pp. 716-723). IEEE.
There are many success goals of cloud computing by the innovation of cloud computing
applied in most of the industries. This paper shows that all the businesses uses some business
processes to organize their works. This paper enables all industries to collaborate with other
companies and helps to exploit the cloud benefits. The collaboration needs security and privacy
so that the collaboration can be proofed all the time it needs. This paper states that all the
industries have their own privacy policy. The approaches that are needed for preserving the
privacy of the cloud are discussed in the paper that includes architecture and a modeling
approach that is private.
This paper helps to evaluate the required architecture of cloud computing that are to be
needs in a company. Also, the modeling approaches are defined from logistic domain and helps
to show the feasibility of the approach.
From this source, the architecture of the cloud computing explained helps to preserve the
project management of businesses.
Schwarzbach, B., Franczyk, B., Petrich, L., Schier, A., & Ten Hompel, M.
(2016, December). Cloud Based Privacy Preserving Collaborative Business
Process Management. In Computer and Information Technology (CIT), 2016
IEEE International Conference on (pp. 716-723). IEEE.
There are many success goals of cloud computing by the innovation of cloud computing
applied in most of the industries. This paper shows that all the businesses uses some business
processes to organize their works. This paper enables all industries to collaborate with other
companies and helps to exploit the cloud benefits. The collaboration needs security and privacy
so that the collaboration can be proofed all the time it needs. This paper states that all the
industries have their own privacy policy. The approaches that are needed for preserving the
privacy of the cloud are discussed in the paper that includes architecture and a modeling
approach that is private.
This paper helps to evaluate the required architecture of cloud computing that are to be
needs in a company. Also, the modeling approaches are defined from logistic domain and helps
to show the feasibility of the approach.
From this source, the architecture of the cloud computing explained helps to preserve the
project management of businesses.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INFORMATION SYSTEM MANAGEMENT
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S.
U. (2015). The rise of “big data” on cloud computing: Review and open
research issues. Information Systems, 47, 98-115.
The complex computing and the massive scale that are performed are done with the help
of cloud computing. Excessive use of hardware, large amount of space, or problem with software
can be eliminated by the concept of cloud computing. Handling the big data in the industries are
actually a challenging job and a time taking task that has to be done manually with large amount
of infrastructure. This research paper deals with the rise of big data in area of cloud computing.
The details of big data are described in detailed in this paper. This paper deals with a comparison
between cloud computing ad big data and elaborates their relationship between them. The
technology of Hadoop is described and the challenges that are faced to investigate the
availability, data transformation, scalability, and data heterogeneity of the data involved in the
system.
This paper shows that cloud computing has changed the concept of information
technology with cloud computing and shows the promises of on-demand services in reality. This
paper shows a classification of big data, the conceptual data of cloud computing, as well as a
service model of cloud.
From this paper, some challenges regarding the volume, data integrity, data
transformation, governance, and the scalability of cloud computing is accessed.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S.
U. (2015). The rise of “big data” on cloud computing: Review and open
research issues. Information Systems, 47, 98-115.
The complex computing and the massive scale that are performed are done with the help
of cloud computing. Excessive use of hardware, large amount of space, or problem with software
can be eliminated by the concept of cloud computing. Handling the big data in the industries are
actually a challenging job and a time taking task that has to be done manually with large amount
of infrastructure. This research paper deals with the rise of big data in area of cloud computing.
The details of big data are described in detailed in this paper. This paper deals with a comparison
between cloud computing ad big data and elaborates their relationship between them. The
technology of Hadoop is described and the challenges that are faced to investigate the
availability, data transformation, scalability, and data heterogeneity of the data involved in the
system.
This paper shows that cloud computing has changed the concept of information
technology with cloud computing and shows the promises of on-demand services in reality. This
paper shows a classification of big data, the conceptual data of cloud computing, as well as a
service model of cloud.
From this paper, some challenges regarding the volume, data integrity, data
transformation, governance, and the scalability of cloud computing is accessed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INFORMATION SYSTEM MANAGEMENT
Luna, J., Suri, N., Iorga, M., & Karmel, A. (2015). Leveraging the potential of
cloud security service-level agreements through standards. IEEE Cloud
Computing, 2(3), 32-40.
There are different types of economic benefit and functions that are provided by cloud
computing. Cloud services are provided by CSPs (Cloud Service Provider) and the services that
are provided are to be transparent, and should give a security assurance. The issues regarding the
service provider mainly comes from two factors- the number of CSPs growing, and secondly the
new architectures that are provided by different CSPs for transferring the data from the virtual
machine to the other database.
This paper mainly emphasize on the services of cloud. The architecture of cloud using the
services are generally referred as the MCS (multi cloud system). The paper introduces unique
challenges related to the inter cloud interfaces and permanent access controls.
Shuleski, D., Birsan, A., Cristea, C. V., & Radu, I. (2016). Impact Of Cloud
Computing Technology Implementation In Public Sector. In Proceedings of
the INTERNATIONAL MANAGEMENT CONFERENCE (Vol. 10, No. 1, pp.
307-315). Faculty of Management, Academy of Economic Studies, Bucharest,
Romania.
The area of technology is changing rapidly with the technological change that is taking
place in private as well as public sector. The sustainability and the strategies of IT are generally
taken care by the cloud computing. The business processes and the efficiency of the organization
can be improved by technologies of cloud computing. The IT revolution has taken place with the
Luna, J., Suri, N., Iorga, M., & Karmel, A. (2015). Leveraging the potential of
cloud security service-level agreements through standards. IEEE Cloud
Computing, 2(3), 32-40.
There are different types of economic benefit and functions that are provided by cloud
computing. Cloud services are provided by CSPs (Cloud Service Provider) and the services that
are provided are to be transparent, and should give a security assurance. The issues regarding the
service provider mainly comes from two factors- the number of CSPs growing, and secondly the
new architectures that are provided by different CSPs for transferring the data from the virtual
machine to the other database.
This paper mainly emphasize on the services of cloud. The architecture of cloud using the
services are generally referred as the MCS (multi cloud system). The paper introduces unique
challenges related to the inter cloud interfaces and permanent access controls.
Shuleski, D., Birsan, A., Cristea, C. V., & Radu, I. (2016). Impact Of Cloud
Computing Technology Implementation In Public Sector. In Proceedings of
the INTERNATIONAL MANAGEMENT CONFERENCE (Vol. 10, No. 1, pp.
307-315). Faculty of Management, Academy of Economic Studies, Bucharest,
Romania.
The area of technology is changing rapidly with the technological change that is taking
place in private as well as public sector. The sustainability and the strategies of IT are generally
taken care by the cloud computing. The business processes and the efficiency of the organization
can be improved by technologies of cloud computing. The IT revolution has taken place with the

5INFORMATION SYSTEM MANAGEMENT
improvement of cloud computing in the business sector. The cost, flexibility, scalability, and the
agility of the processes are maintained by the cloud computing. This paper mainly discusses all
the factors involved in cloud computing for implementing on the transportation sector of
Romania public by the combination of all the methods that existed. This paper shows many case
studies with qualitative method along with the cost and the security of cloud computing
implemented in private as well as public sectors.
This paper evaluates the challenges and the opportunities for the reason of delivering a
new way of computer services and resource with security, management and IT. This paper deals
with implementing cloud services in Romanian Public Transportation and many other case
studies.
From this research paper, many case studies can be studied that deals with cloud
computing and the security issues involved in cloud computing.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing
from an enterprise perspective. Procedia Technology, 12, 529-534.
The process of storing the data is changing rapidly day by day with the success of
internet, making the computing resources much cheaper. The processes of storing the data are
more powerful and are found easily. The interest of the industries regarding the cloud computing
are increasing day by day, but they are facing difficulty to proceed with the larger amount of cost
and obstacles that are faced by them. In this research, the factors that are needed in an enterprise
are studied from the company while they are making decision involved with cloud computing.
Some companies do not know the actual need of cloud computing and implementing them only
improvement of cloud computing in the business sector. The cost, flexibility, scalability, and the
agility of the processes are maintained by the cloud computing. This paper mainly discusses all
the factors involved in cloud computing for implementing on the transportation sector of
Romania public by the combination of all the methods that existed. This paper shows many case
studies with qualitative method along with the cost and the security of cloud computing
implemented in private as well as public sectors.
This paper evaluates the challenges and the opportunities for the reason of delivering a
new way of computer services and resource with security, management and IT. This paper deals
with implementing cloud services in Romanian Public Transportation and many other case
studies.
From this research paper, many case studies can be studied that deals with cloud
computing and the security issues involved in cloud computing.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing
from an enterprise perspective. Procedia Technology, 12, 529-534.
The process of storing the data is changing rapidly day by day with the success of
internet, making the computing resources much cheaper. The processes of storing the data are
more powerful and are found easily. The interest of the industries regarding the cloud computing
are increasing day by day, but they are facing difficulty to proceed with the larger amount of cost
and obstacles that are faced by them. In this research, the factors that are needed in an enterprise
are studied from the company while they are making decision involved with cloud computing.
Some companies do not know the actual need of cloud computing and implementing them only
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6INFORMATION SYSTEM MANAGEMENT
because it is in trend. While some of the companies do not even know the importance of cloud
computing and do not know how to protect their sensitive data.
This paper actually involves the challenges and the advantages for adopting the cloud
computing by many industries. The companies that has involved the method of cloud computing
actually do not know the work of cloud computing.
There are more than one option regarding the way to adopt cloud computing. This paper
describes the right way of adopting the methodologies in the companies and the challenges that
can be faced by the industries while using the service of cloud computing.
Alshammari, H., & Bach, C. (2013). Administration security issues in cloud
computing. International Journal of Information Technology Convergence and
Services, 3(4), 1.
The security risks that are involved with cloud computing are discussed in this paper.
With the emerging of technologies, there are possibilities of new threats regarding the security of
the cloud computing. The technologies that can brig destruction must be kept secured with all the
technologies. The internet provides risks technologically to the processes that are involved in
industries. This paper illustrates different issues that enhance cyber crimes in industries. There
are real risks as well as technological risks in an industry. The paper illustrates that the security
weakness is the most important feature for the cloud computing. There are different applications
that are suggested in this paper through cloud computing so that the securities of the applications
are meet. Many examples are elaborated in the paper that helps to secure the network of cloud
computing.
because it is in trend. While some of the companies do not even know the importance of cloud
computing and do not know how to protect their sensitive data.
This paper actually involves the challenges and the advantages for adopting the cloud
computing by many industries. The companies that has involved the method of cloud computing
actually do not know the work of cloud computing.
There are more than one option regarding the way to adopt cloud computing. This paper
describes the right way of adopting the methodologies in the companies and the challenges that
can be faced by the industries while using the service of cloud computing.
Alshammari, H., & Bach, C. (2013). Administration security issues in cloud
computing. International Journal of Information Technology Convergence and
Services, 3(4), 1.
The security risks that are involved with cloud computing are discussed in this paper.
With the emerging of technologies, there are possibilities of new threats regarding the security of
the cloud computing. The technologies that can brig destruction must be kept secured with all the
technologies. The internet provides risks technologically to the processes that are involved in
industries. This paper illustrates different issues that enhance cyber crimes in industries. There
are real risks as well as technological risks in an industry. The paper illustrates that the security
weakness is the most important feature for the cloud computing. There are different applications
that are suggested in this paper through cloud computing so that the securities of the applications
are meet. Many examples are elaborated in the paper that helps to secure the network of cloud
computing.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INFORMATION SYSTEM MANAGEMENT
This research paper shows two important conditions that are used in voting system. The
conditions are related with time involved in data collection and the security that are involved in
the result of cloud computing.
From this paper, the concept of E-learning can be learnt. The electronic learning helps to
save the time as well as cost of the methods involved in cloud computing.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V.
(2014). Security and privacy for storage and computation in cloud
computing. Information Sciences, 258, 371-386.
From the paper it can be concluded that the cloud computing that helps in emerging the
new computer paradigm mainly helps to provide reliable as well a customized service quality
with computation environments that are guaranteed for the users of cloud. The applications
involved and the databases are generally transmitted to the centralized data centers that are
known as cloud. This paper states that because of resource virtualization, migration and global
replication, there is an absence of machine in cloud and data change in the cloud. The data that
are stored in cloud compute the results of storing the data. The cloud computing can lessen the
cost of storing huge amount of data to maintain an optimal size of sampling.
This paper proposes a protocol for securing the computation protocol known as SeeCloud
for data security in the cloud. The security of data storage and the security auditing computation
are detailed in this paper.
This research paper shows two important conditions that are used in voting system. The
conditions are related with time involved in data collection and the security that are involved in
the result of cloud computing.
From this paper, the concept of E-learning can be learnt. The electronic learning helps to
save the time as well as cost of the methods involved in cloud computing.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V.
(2014). Security and privacy for storage and computation in cloud
computing. Information Sciences, 258, 371-386.
From the paper it can be concluded that the cloud computing that helps in emerging the
new computer paradigm mainly helps to provide reliable as well a customized service quality
with computation environments that are guaranteed for the users of cloud. The applications
involved and the databases are generally transmitted to the centralized data centers that are
known as cloud. This paper states that because of resource virtualization, migration and global
replication, there is an absence of machine in cloud and data change in the cloud. The data that
are stored in cloud compute the results of storing the data. The cloud computing can lessen the
cost of storing huge amount of data to maintain an optimal size of sampling.
This paper proposes a protocol for securing the computation protocol known as SeeCloud
for data security in the cloud. The security of data storage and the security auditing computation
are detailed in this paper.

8INFORMATION SYSTEM MANAGEMENT
El-Zoghby, A. M., & Azer, M. A. (2017, December). Cloud computing privacy
issues, challenges and solutions. In Computer Engineering and Systems
(ICCES), 2017 12th International Conference on (pp. 154-160). IEEE.
The initiatives that are involved in cloud computing generally represent many benefits so
that the customer can be given with their bests service. There are many challenges and many
concerns that are regarded for the security as well as the privacy of the company involved in the
cloud. The cloud computing has many data of life cycle that are elaborated in this paper. All the
securities along with the challenges are described elaborately.
The paper deals with the laws and regulations involved in life cycle data of cloud
computing. For keeping the data safe and secure, this research paper deals with data privacy of
cloud computing.
There are some future works suggested in this research paper that focuses mainly on the
algorithms and privacy techniques of cloud computing.
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security
incident handling in the cloud. Computers & Security, 49, 45-69.
According to the authors, strategies that are involved in handling the incidents to mitigate
the risks to CIA (Confidentiality, the Integrity, and the availability) in an organization are
involved in this paper. The loss of the company is generally minimized when the company shifts
their network to cloud computing. The paper surveys many literature reviews and incidents that
handle the knowledge gap in cloud environment. The legal reputation and the financial
reputation are handle with the cloud computing. This paper helps to solve the incidents that are
El-Zoghby, A. M., & Azer, M. A. (2017, December). Cloud computing privacy
issues, challenges and solutions. In Computer Engineering and Systems
(ICCES), 2017 12th International Conference on (pp. 154-160). IEEE.
The initiatives that are involved in cloud computing generally represent many benefits so
that the customer can be given with their bests service. There are many challenges and many
concerns that are regarded for the security as well as the privacy of the company involved in the
cloud. The cloud computing has many data of life cycle that are elaborated in this paper. All the
securities along with the challenges are described elaborately.
The paper deals with the laws and regulations involved in life cycle data of cloud
computing. For keeping the data safe and secure, this research paper deals with data privacy of
cloud computing.
There are some future works suggested in this research paper that focuses mainly on the
algorithms and privacy techniques of cloud computing.
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security
incident handling in the cloud. Computers & Security, 49, 45-69.
According to the authors, strategies that are involved in handling the incidents to mitigate
the risks to CIA (Confidentiality, the Integrity, and the availability) in an organization are
involved in this paper. The loss of the company is generally minimized when the company shifts
their network to cloud computing. The paper surveys many literature reviews and incidents that
handle the knowledge gap in cloud environment. The legal reputation and the financial
reputation are handle with the cloud computing. This paper helps to solve the incidents that are
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9INFORMATION SYSTEM MANAGEMENT
in the cloud environment. The capability maturity model, digital forensics, and incident handling
are all done by cloud computing.
The paper carries out different surveys that shows the cloud computing in different
industries. The knowledge gap in between the companies and the cloud computation are
minimized by the property of cloud computing.
This paper helps to know the different types of cloud computing methods and how they
are implemented in different companies. The strategies of cloud computing are described that
helps to get a detailed idea about cloud computing.
in the cloud environment. The capability maturity model, digital forensics, and incident handling
are all done by cloud computing.
The paper carries out different surveys that shows the cloud computing in different
industries. The knowledge gap in between the companies and the cloud computation are
minimized by the property of cloud computing.
This paper helps to know the different types of cloud computing methods and how they
are implemented in different companies. The strategies of cloud computing are described that
helps to get a detailed idea about cloud computing.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10INFORMATION SYSTEM MANAGEMENT
References
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling
in the cloud. Computers & Security, 49, 45-69.
Alshammari, H., & Bach, C. (2013). Administration security issues in cloud
computing. International Journal of Information Technology Convergence and
Services, 3(4), 1.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
El-Zoghby, A. M., & Azer, M. A. (2017, December). Cloud computing privacy issues,
challenges and solutions. In Computer Engineering and Systems (ICCES), 2017 12th
International Conference on (pp. 154-160). IEEE.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Luna, J., Suri, N., Iorga, M., & Karmel, A. (2015). Leveraging the potential of cloud security
service-level agreements through standards. IEEE Cloud Computing, 2(3), 32-40.
References
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling
in the cloud. Computers & Security, 49, 45-69.
Alshammari, H., & Bach, C. (2013). Administration security issues in cloud
computing. International Journal of Information Technology Convergence and
Services, 3(4), 1.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
El-Zoghby, A. M., & Azer, M. A. (2017, December). Cloud computing privacy issues,
challenges and solutions. In Computer Engineering and Systems (ICCES), 2017 12th
International Conference on (pp. 154-160). IEEE.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Luna, J., Suri, N., Iorga, M., & Karmel, A. (2015). Leveraging the potential of cloud security
service-level agreements through standards. IEEE Cloud Computing, 2(3), 32-40.

11INFORMATION SYSTEM MANAGEMENT
Mvelase, P., Sithole, H., Modipa, T., & Mathaba, S. (2016, November). The economics of cloud
computing: A review. In Advances in Computing and Communication Engineering
(ICACCE), 2016 International Conference on (pp. 159-167). IEEE.
Schwarzbach, B., Franczyk, B., Petrich, L., Schier, A., & Ten Hompel, M. (2016, December).
Cloud Based Privacy Preserving Collaborative Business Process Management.
In Computer and Information Technology (CIT), 2016 IEEE International Conference
on (pp. 716-723). IEEE.
Shuleski, D., Birsan, A., Cristea, C. V., & Radu, I. (2016). Impact Of Cloud Computing
Technology Implementation In Public Sector. In Proceedings of the INTERNATIONAL
MANAGEMENT CONFERENCE (Vol. 10, No. 1, pp. 307-315). Faculty of Management,
Academy of Economic Studies, Bucharest, Romania.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, 371-
386.
Mvelase, P., Sithole, H., Modipa, T., & Mathaba, S. (2016, November). The economics of cloud
computing: A review. In Advances in Computing and Communication Engineering
(ICACCE), 2016 International Conference on (pp. 159-167). IEEE.
Schwarzbach, B., Franczyk, B., Petrich, L., Schier, A., & Ten Hompel, M. (2016, December).
Cloud Based Privacy Preserving Collaborative Business Process Management.
In Computer and Information Technology (CIT), 2016 IEEE International Conference
on (pp. 716-723). IEEE.
Shuleski, D., Birsan, A., Cristea, C. V., & Radu, I. (2016). Impact Of Cloud Computing
Technology Implementation In Public Sector. In Proceedings of the INTERNATIONAL
MANAGEMENT CONFERENCE (Vol. 10, No. 1, pp. 307-315). Faculty of Management,
Academy of Economic Studies, Bucharest, Romania.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, 371-
386.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.