Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levels

6Citations
Citations of this article
65Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing has been established as a technology for providing needs-orientated and use-dependent IT resources, which now are being used more frequently for business information systems. Particularly in terms of integration of decentralized information systems, cloud systems are providing a stable solution approach. Still, data security is one of the biggest challenges when using cloud systems and a main reason why many companies avoid using cloud services. The question we are facing is how cloud systems for integration of decentralized information systems have to be designed, in terms of technology and organization, so that privacy laws of the cloud user can be guaranteed. This contribution summarizes the results of a system comparison of decentralized cloud systems in social networks, a requirements analysis based on a literature analysis, and a model for organizational levels of cloud systems, derived from the requirements analysis.

Cite

CITATION STYLE

APA

Müller, A., Ludwig, A., & Franczyk, B. (2017). Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levels. Journal of Cloud Computing, 6(1). https://doi.org/10.1186/s13677-017-0082-3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free