Abstract
For automation industry, Information Technology (IT) is an essential production factor, but also a major expense post. Because cloud computing promises to deliver IT services more flexibly and cost-efficiently, it for automation industry prospectively. However, given the high degree of regulation, concerns regarding security and compliance requirements arise. In this work, provide a theoretical analysis of security problems in the context of cloud computing. This analysis is complemented by the initial results of an ongoing case study concerning the practical relevance of these problems in the industry. The analysis confirms that security issues pose notable obstacles for the adoption of cloud computing in practice, but also points to appropriate countermeasures
Highlights
For automation industry, the collection, processing, and dissemination of large amounts of information constitute the basis for all processes [1]
We examine the following research question in the work at hand: “Do security concerns pose an obstacle for the adoption of cloud computing in the critical infrastructure industry and, if yes, which concerns ”? We provide a theoretical analysis of potential security problems in conjunction with the application of cloud computing
Information Technology (IT) is one of the substantial production factors, and its relative importance has steadily increased in recent decades
Summary
The collection, processing, and dissemination of large amounts of information constitute the basis for all processes [1]. Due to the constant decline in the absolute cost of IT equipment, many industry institutions have historically replaced other production factors with IT. It is reasonable to conclude that these concerns are especially pronounced in the critical infrastructure, which is among the most regulated sectors, and subject to rigid security requirements. Based on these observations, we examine the following research question in the work at hand: “Do security concerns pose an obstacle for the adoption of cloud computing in the critical infrastructure industry and, if yes, which concerns ”?
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.