SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2779
Effects of Security and Privacy Concerns on using
of Cloud Services in Energy Industry, an Oil and
Gas Company: A Case Study
Alireza Poorebrahimi
Department of Information Technology Management Islamic Azad University, Science & Research Branch of Tehran,
Iran, Email: poorebrahimi@gmail.com
Fatemeh SoleimaniRoozbahani
Department of Information Technology Management Islamic Azad University, Science and Research Branch of Tehran,
Iran, Email: fa.solaymani@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The topic of ‘‘the cloud’’ has attracted significant attention throughout the past few years. It allows resource
sharing that includes software, platform and infrastructure by means of virtualization. Cloud Adoption in Oil &
Gas companies have approached cloud with caution, but they are increasingly deploying cloud services. Energy
companies have carefully weighed whether they should opt for a public cloud versus a private one, and which
applications are fit for deployment via the cloud. For the most part, the industry has opted to use cloud for generic
purposes. Generic business functions like payroll process and procurement are being run through the cloud, along
with customer relationship management, likely through software-as-a-service offerings that have become well-
known. Security is as much of an issue in the cloud as it is anywhere else. Different people share different point of
view on cloud computing. Some believe it is unsafe to use cloud. Cloud vendors go out of their way to ensure
security. This paper aims to understand the effects of security and privacy concerns on educational use of cloud
services. This proposed a research model based on Ajzen’s (1991) Theory of Planned Behavior (TPB). Following
the TPB, the research developed a model, which posits that staff attitudes predicted by security and privacy
perceptions and behavioral intentions are predicted by attitudes towards using cloud services. The Model was
assess the based on the data collected by means of survey questionnaires. Results supported the proposed model,
validating the predictive power of the TPB.
Keywords - Cloud services; Privacy; Security; Energy Industry, Oil and Gas.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Dec 14, 2015 Date of Acceptance: Dec 17, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Information Technology (IT) has been adding significant
benefits to various aspects of people’s life, either in terms
of convenience or comfort or entertainment [1]. In other
side, the present competitive environment, companies are
wondering how to reduce their IT costs while increasing
their efficiency and agility to react when changes in the
business processes are required. Cloud Computing is the
latest paradigm to optimize the use of IT resources
considering “everything as a service” and receiving these
services from the Cloud (Internet) instead of owning and
managing hardware and software assets [2]. Cloud
computing is a pervasive computing paradigm that has
revolutionized how computer infrastructure and services
are delivered [3]. Cloud computing has been widely
adopted by enterprises in their business application in the
last decade [4]. Cloud computing has been propounded as
a paradigm shift in the delivery of information technology
(IT) resources and services. It has been dubbed by
proponents of the technology as the fifth utility after
water, electricity, gas, and telephone utilities [2]. The topic
of ‘‘the cloud’’ has attracted significant attention
throughout the past few years [5, 6, 7] and, as a result,
academics and trade journals have created several
competing definitions of cloud computing [8, 9]. Despite
the lack of consensus about definitions, however, there is
broad agreement on the growing demand for cloud
computing. Some estimates suggest that spending on
cloud-related technologies and services in the next few
years may climb as high as $42 billion/year [10]. Roster et
al. [11] identify three of the more commonly cited reasons
for migrating functions and capabilities to the cloud: Cost
reduction, Deployment flexibility, Speed to implement
[12].
Some industries—most notably, the financial services and
telecommunications sectors—have been relatively quick
adopters, while others have approached the cloud more
cautiously and slowly [12].
Despite the compelling case for moving towards cloud
computing, the upstream oil & gas industry faces several
technical challenges—most notably, a pronounced
emphasis on data security, a reliance on extremely large
data sets, and significant legacy investments in
information technology infrastructure—that make a full
migration to the public cloud difficult at present [13]. Oil
and gas companies have approached cloud with caution,
but they are increasingly deploying cloud services. Energy
companies have carefully weighed whether they should
opt for a public cloud versus a private one, and which
applications are fit for deployment via the cloud. For the
most part, the industry has opted to use cloud for generic
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2780
purposes. For example, cloud is being used or considered
for infrastructure such as data backup and archiving and
data storage (raw data, backup, archiving, email storage).
Generic business functions like payroll process and
procurement are being run through the cloud, along with
customer relationship management, likely through
software-as-a-service offerings that have become well-
known. Another fairly generic application is for
collaborative applications such as email, group
calendaring, and messaging. Entrepreneurial independent
upstream oil and gas companies primarily involved in
unconventional shale gas and tight oil initiatives have
adopted cloud to perform these functions. Because of
security considerations, the oil and gas industry generally
prefers private cloud over public cloud for core
applications [14].
Despite the compelling case for moving towards the cloud,
however, the absorption of these technologies and services
has been uneven [12].
Most oil and gas companies are balancing the
opportunities versus the risks in considering whether to
adopt cloud technologies. On the one hand, cloud enables
increased collaboration and can result in decreased
operational costs due to reduced infrastructure
investments, quick deployment, and flexibility of use. That
said, security concerns persist over cloud deployment. IT
security remains the number one priority for the industry,
and many CIOs have had doubts about the security of the
cloud and the ability of cloud providers to offer data
privacy.
However, there is evidence that the industry is becoming
more receptive to cloud technologies. Cloud will likely be
used in less-sensitive applications. Collaboration is
becoming critical for many O&G companies, due to skills
shortage, internationalization of operations, and growing
importance of collaborative work with business partners.
Sensitive information needs to be shared with
stakeholders, remote teams, suppliers, and JV partners to
maximize productivity and knowledge transfer.
Deployment of cloud-based solutions for document
management would enhance the collaborative experience
and allow the O&G companies to eliminate decentralized
systems with a central repository across multiple locations
and business units.
However, there are also concerns and issues to be solved
before Cloud Computing spreads across the different
industries [2]. However, some challenges still need to be
addressed such as security and privacy issues [15, 16].
Cloud Computing security is the major concern to be
addressed nowadays. If security measures are not provided
properly for data operations and transmissions then data is
at high risk [17]. Since cloud computing provides a facility
for a group of users to access the stored data there is a
possibility of having high data risk. Strongest security
measures are to be implemented by identifying security
challenge and solutions to handle these challenges [18].
The paper proceeds as follows. In the second section, the
literature on studies of cloud computing adoption and use
has been reviewed. The next sessions have been allot to
the research methods and the results of data analysis.
Finally, discussion of the research findings and their
implications are provided along with the limitations of the
study.
II. LITERATURE REVIEW
Cloud computing has recently received increasing
attention in information systems and computer science
disciplines [19]. Movahedisefat et al. [20] proposed one
of the most pervasive and fundamental challenges for
organizations in demonstrating policy compliance is
proving that the physical and virtual infrastructure of the
cloud can be trusted—particularly when those
infrastructure components are owned and managed by
external service providers. The next frontier in cloud
security and compliance will be to create transparency at
the bottom-most layers of the cloud by developing the
standards, tools, and linkages to monitor and prove that the
cloud’s physical and virtual machines are actually
performing as they should [20]. Pearson [21] claims some
core traditional mechanisms for addressing privacy (such
as model contracts) are no longer flexible or dynamic
enough, so new approaches need to be developed to fit this
new paradigm. He assess how security, trust and privacy
issues occur in the context of cloud computing and discuss
ways in which they may be addressed [21].
Yu et al. [17] addressed the problem of simultaneously
achieving fine-grainedness, scalability, and data
confidentiality of access control open issue by, on one
hand, defining and enforcing access policies based on data
attributes, and, on the other hand, allowing the data owner
to delegate most of the computation tasks involved in fine
grained data access control to untrusted cloud servers
without disclosing the underlying data contents [17].
Popović [22], discussed about the security issues,
requirements and challenges that are faced by cloud
service providers during cloud engineering [22]. Sabahi
[23] discussed about the security issues, reliability and
availability for cloud computing. He also proposed a
feasible solution for few security issues [23]. Liu
introduced some cloud computing systems and analyzes
cloud computing security problems and its strategy
according to the cloud computing concepts [24]. It is
obvious as the enthusiasm for utilize the cloud is very
high, the concerns about its challenges, particularly its
security, is high, therefore the security is a factor which
affects the using cloud computing.
III. RESEARCH METHODOLOGY
Theory of planned behavior (TPB), a prominent reasoned
action model, its conceptual foundation, its intellectual
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2781
history, and the research it has generated. From its roots in
propositional control and expectancy theory, the TPB
From its roots in propositional control and expectancy
theory, the TPB. According to the theory, intention is the
immediate antecedent of behavior and is itself a function
of attitude towards the behavior, subjective norm, and
perceived behavior control; and these determinants follow,
respectively, from beliefs about the behavior`s likely
consequences, about normative expectations of important
others, and about the presence of factors that control
behavioral performances [25]. In TPB, beliefs that are
specific to each situation are antecedent to attitude. The
theory does not assume that beliefs that apply in one
context also apply in other contexts. Likewise, TPB taps
the important control variables for each situation
independently and is more likely to capture situation
specific factors [26]. Security and privacy perception is
significant predictors of attitude towards using the cloud
services in an Energy Industry can be considered in the
model.
In an attempt to ensure content validity and face validity,
the survey instrument was developed based on
questionnaire items that had been successfully used in
prior studies. The factors which play a fundamental role in
the model include: Security and privacy, Attitude,
Behavioral intention. Security refers to the degree to
which students believe that cloud services are secure
platforms for storing and sharing sensitive data. Attitude
towards using technology is defined as students’ overall
affective reaction to using cloud service [27]. Behavioral
intention refers to the degree to which a student has
formulated conscious plans to use or not use cloud
services in the future [28].
Based on the factors, the hypothesizes are:
H1. Perceived security and privacy will have a positive
influence on attitude.
H2. Attitude will have a significant positive influence on
behavioral intention.
H3. Behavioral intention will have a significant positive
influence on use of cloud services in Energy Industry
(Fig 1).
Fig 1. Model of Research
IV. METHODOLOGY
Based on the feedback from expert panel, modifications
were done on the survey instrument. The instrument has
total 16 Likert items, including 5 items for security-
privacy, 4 items for use, 4 items for behavioral intention,
and 3 items for attitude. Participants were asked to
indicate their level of agreement using a five-point scale
ranging from ‘‘strongly agree’’ to ‘‘strongly disagree.’’
In total, 50 randomly selected members of an Oil and Gas
company (which wants to be anonymous). However, 5
questionnaires were discarded from data set.
Prior to conducting factor analysis, data set was checked
for suitability for factor analysis. After the data set was
checked for factorability, 19 items were subjected to factor
analysis. We conducted an exploratory factor analysis
using principal components extraction to test construct
validity of the scale. Based on the results of the
exploratory factor analysis, 3 questionnaire items were
omitted from the scale. The Bartlett’s test of Sphericity
indicated that the measures for four latent constructs were
interdependent and the KMO measure of sampling
adequacy was well above the minimally accepted level of
.50. On the basis of a scree plot of eigenvalues, a one-
factor solution appeared to be most appropriate for each
measurement. For each measurement, total variance
explained ranged between 49.74 and 74.95, which are all
much higher than acceptable value of .40 for measures
with one factor Moreover, each measurement item has a
factor loading above .71 and communality value above
.50. Factor loadings, which are all much higher than
acceptable value of .40, ensure that factor structures are
robust. The corrected item-total correlation coefficients
ranged from .49 to .80, indicating acceptable to high
homogeneity of the items.
V. DISCUSSION AND FINDINGS
This paper extends Ajzen’s (1991) Theory of Planned
Behavior (TPB) to explain and predict educational use of
cloud services by pre-service teachers. Following the TPB,
we developed a research model, which posits that student
attitudes predicted by security and privacy perceptions and
behavioral intentions are predicted by attitudes towards
using cloud services. The findings supported the proposed
model, validating the predictive power of the TPB. The
findings stressed the importance of security and privacy
variable, which add to the explanatory and predictive
power of the model, in predicting attitudes towards using
cloud services, justifying the integration of this variable
within the TPB framework.
The study hypothesized that security and privacy have a
positively significant influence on staffs` attitudes towards
using cloud services. The results, along with previous
studies, support this hypothesis. This study has shown that
security and privacy perceptions have a significant
influence on attitude. Security variable has been found in
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2782
prior studies as a significant predictor of adoption
behavior, for example Salisbury et al. (2001) found that
perceived security is a strong predictor of intention to
purchase online. Zhu et al. (2006) found that security
perception has a significant effect on e-business adoption.
Dillon et al. (2010) found that security issues have an
important role in hindering cloud computing. Lin and
Chen (2012) argued that challenges of cloud computing
are security and standardization. More recently, Park and
Kim (2014) found that user acceptance of mobile cloud
services is largely affected by security, perceived mobility,
quality of service, connectedness, and satisfaction.
The results of the study supported assumptions of Theory
of Planned Behavior that we based our study on. This
suggests that the assumptions of this theory can be used to
explain the nature of educational use of similar
technologies. The present study may also contribute to the
literature since the study on oil and gas industry use of
cloud services is limited. The security and privacy
variables were found to be a strong determinant of oil and
gas industry use of cloud services. Therefore, these
variables should be taken into account in future researches
on use of similar technologies. Moreover, the results
demonstrated that attitude has a stronger effect on oil and
gas industry use of cloud services than behavioral
intention. Thus, future studies may focus on the effect of
attitude on oil and gas industry use of such services to
develop a more parsimony model that efficiently predicts
usage.
REFERENCES
[1] O. Ali and J. Soar, "Challenges and Issues Within
Cloud Computing Technology," CLOUD
COMPUTING : The Fifth International Conference
on Cloud Computing, GRIDs, and Virtualization,
2014 .
[2] C. R. Monroy, C. A. Arias and Y. N. Guerrero, "The
new cloud computing paradigm: the way to IT seen
as a utility," Latin American and Caribbean Journal
of Engineering Education, 6(2), 2013.
[3] H. M. Sabi, F.-M. E. Uzoka, K. Langmia and F. N.
Njehda, "Conceptualizing a model for adoption of
cloud computing in education," International Journal
of Information Management 36, p. 183–191, 2016.
[4] S. Nepal and S. Pandey, "Guest Editorial: Cloud
Computing and Scientific Applications (CCSA)—Big
Data Analysis in the Cloud," The Computer Journal
Advance Access published February 1, 2015.
[5] S. Cherry, "Forecast for cloud computing: up, up, and
away.," IEEE Spectrum 46, 2009.
[6] M.-H. Kuo, A. Kushniruk and E. Borycki, "Can cloud
computing benefit health services? A SWOT
analysis," Studies in Health Technology and
Informatics 169, p. 379–383, 2011.
[7] T. Sterling and D. Stark, "A high-performance
computing forecast: partly cloudy," Computing in
Science & Engineering 11(4), p. 42–49, 2009.
[8] K. Kushida, J. Murray and J. Zysman, "Diffusing the
cloud: cloud computing and implications for public
policy," JournalofIndustry, Competition and Trade
11(3), p. 209–237, 2011.
[9] H. R. Motahari-Nezhad, B. Stephenson and S.
Singhal, "Outsourcing Business to Cloud Computing
Services: Opportunities and Challenges," IEEE
Internet Computing, Special Issue on Cloud
Computing, 2009.
[10] R. Buyya, S. Pandey and C. Vecchiola, "Cloudbus
toolkit for market-oriented cloud computing," Cloud
Computing Springer Berlin Heidelberg, pp. 24-44,
2009.
[11] J. Roster, C. Moore, and K. Pfeiler, "Who really cares
about the cloud? An industry perspective," Paper
presented at the Gartner Webinar, August 24, 2010.
[12] R. K.Perrons and A. Hems, "Cloud computingin the
upstream oil & gas industry: Aproposed way
forward," Energy Policy, vol. 56, p. 732–737, 2013.
[13] R. K. Perrons and A. Hems, "Cloud computing in the
upstream oil & gas industry: A proposed way
forward," Energy Policy 56, p. 732–737, 2013.
[14] "Migrat ing to Cloud: The Business Value for Oil,"
IDC Energy Insights, 2014.
[15] T. Dillon, C. Wu and E. Chang, "Cloud computing:
Issues and challenges," In 24th IEEE international
conference on advanced information networking and
applications, 2010.
[16] E. Park and K. J. Kim, "An ıntegrated adoption model
of mobile cloud services: Exploration of key
determinants and extension of technology acceptance
model," Telematics and Informatics, 31(3), p. 376–
385, 2014.
[17] S. Yu, C. Wang, K. Ren and W. Lou, "Achieving
secure, scalable and fine-grained data access control
in cloud computing," IEEE Communications Society
subject matter experts for publication in the IEEE
INFOCOM 2010 proceedings, pp. 1-9, 2010.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2783
[18] R. V. Rao and K. Selvamani, "Data Security
Challenges and Its Solutions in Cloud Computing,"
Procedia Computer Science 48, p. 204 – 209, 2015.
[19] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R.
Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin,
I. Stoica and M. Zaharia, "Above the Clouds: A
Berkeley View of Cloud Computing," UC Berkeley
Reliable Adaptive Distributed Systems Laboratory,
2009.
[20] M. R. Movahedisefat, S. M. R. Farshchi and D.
Mohammadpur, "Emerging Security Challenges in
Cloud Computing, from Infrastructure-Based
Security to Proposed Provisioned Cloud
Infrastructure," Emerging Trends in ICT Security,
2014.
[21] S. Pearson, "Privacy, Security and Trust in Cloud
Computing," Computer Communications and
Networks, pp. 4471-4189, 2013.
[22] K. Popović, "Cloud computing security issues and
challenges," In MIPRO, 2010 proceedings of the 33rd
international convention IEEE, pp. 344-349, 2010.
[23] F. Sabahi, "Cloud computing security threats and
responses," In Communication Software and
Networks (ICCSN), 2011 IEEE 3rd International
Conference on IEEE, pp. 245-249, 2011.
[24] W. Liu, "Research on Cloud Computing Security
Problem and Strategy," In Consumer Electronics,
Communications and Networks (CECNet), 2nd
International Conference on IEEE, pp. 1216-1219,
2012.
[25] I. Ajzen, "Theory of planned behavior, Handb Theor
Soc Psychol Vol One, 2011.
[26] K. Mathieson, "Predicting user intentions: Comparing
the technology," Information Systems Research, 2(3),
p. 173–191, 1991.
[27] V. Venkatesh and H. Bala, "Technology acceptance
model 3 and a research agenda on interventions,"
Decision sciences, 39(2), pp. 273-315, 2008.
[28] P. R. Warshaw and F. D. Davis, "Disentangling
behavioral intention and behavioral expectation,"
Journal of experimental social psychology, 21(3), pp.
213-228, 1985.
Biographies and Photographs
Professor Alireza Poorebrahimi, has
obtained Ph. D. degree in Industrial
Management from SRBIA University in
1993. His research fields are Network
Security Management, Passive Defense,
Cloud Computing, e-Banking and e-
Commerce. He is appointed as a
Professor in the SRBIA University,
Deptt. of Management.
Miss.Fatemeh Soleimani Roozbahani
has obtained B.S. degree in Nuclear
Physics from Shahid Chamran
University in 2009, and has obtained
Master degree in Information
Technology Management summa cum
laude with a cumulative GPA of 19.76
[out of 20] amongst the graduates of this
major who had been graduated in 2011 from Farabi
University. Presently she is pursuing Ph.D. in Information
Technology Management in SRBIA University. Her
research fields are Information Business Intelligence,
Deep Learning, Cloud Computing, and Security in
Computer Networks. She is appointed as a Lecturer in
Azad University, Deptt. of Information Technology.

More Related Content

What's hot

IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
Shahbaz Sidhu
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsSecure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
paperpublications3
 

What's hot (16)

IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsSecure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
 
70 74
70 7470 74
70 74
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 

Viewers also liked

GameBus: a platform for physical, social and cognitive health gamification
GameBus: a platform for physical, social and cognitive health gamificationGameBus: a platform for physical, social and cognitive health gamification
GameBus: a platform for physical, social and cognitive health gamification
Games for Health Europe
 
Taking game app's post-launch management to the next level
Taking game app's post-launch management to the next levelTaking game app's post-launch management to the next level
Taking game app's post-launch management to the next level
miranpark88
 
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Eswar Publications
 
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...
Eswar Publications
 
TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)
TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)
TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)
TOAST_NHNent
 
텐바이텐 브랜드북_숙명여대 장소영
텐바이텐 브랜드북_숙명여대 장소영텐바이텐 브랜드북_숙명여대 장소영
텐바이텐 브랜드북_숙명여대 장소영
소영 장
 
브랜드커뮤니케이션 롤링핀 브랜드북
브랜드커뮤니케이션 롤링핀 브랜드북브랜드커뮤니케이션 롤링핀 브랜드북
브랜드커뮤니케이션 롤링핀 브랜드북
happtythe
 
Ideacream_kimboram
Ideacream_kimboramIdeacream_kimboram
Ideacream_kimboram
Boram Kim
 
Scrum master checklist
Scrum master checklistScrum master checklist
Scrum master checklist
Shaju Rasheed
 
frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015
Patrick Kalaher
 
IoT Crowd
IoT CrowdIoT Crowd
Strategic pyramid
Strategic pyramidStrategic pyramid
Strategic pyramid
SenZations Summer School
 
PepperとWatson音声関連API
PepperとWatson音声関連APIPepperとWatson音声関連API
PepperとWatson音声関連API
Forex Robotics Co., Ltd.
 
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...
Damo Consulting Inc.
 
해커에게 전해들은 머신러닝 #4
해커에게 전해들은 머신러닝 #4해커에게 전해들은 머신러닝 #4
해커에게 전해들은 머신러닝 #4
Haesun Park
 

Viewers also liked (17)

GameBus: a platform for physical, social and cognitive health gamification
GameBus: a platform for physical, social and cognitive health gamificationGameBus: a platform for physical, social and cognitive health gamification
GameBus: a platform for physical, social and cognitive health gamification
 
Taking game app's post-launch management to the next level
Taking game app's post-launch management to the next levelTaking game app's post-launch management to the next level
Taking game app's post-launch management to the next level
 
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
 
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...
 
TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)
TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)
TOAST Meetup2015 - TOAST Cloud XaaS framework architecture (문지응)
 
텐바이텐 브랜드북_숙명여대 장소영
텐바이텐 브랜드북_숙명여대 장소영텐바이텐 브랜드북_숙명여대 장소영
텐바이텐 브랜드북_숙명여대 장소영
 
Excel
ExcelExcel
Excel
 
브랜드커뮤니케이션 롤링핀 브랜드북
브랜드커뮤니케이션 롤링핀 브랜드북브랜드커뮤니케이션 롤링핀 브랜드북
브랜드커뮤니케이션 롤링핀 브랜드북
 
Ideacream_kimboram
Ideacream_kimboramIdeacream_kimboram
Ideacream_kimboram
 
Scrum master checklist
Scrum master checklistScrum master checklist
Scrum master checklist
 
Paint програм
Paint програмPaint програм
Paint програм
 
frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015
 
IoT Crowd
IoT CrowdIoT Crowd
IoT Crowd
 
Strategic pyramid
Strategic pyramidStrategic pyramid
Strategic pyramid
 
PepperとWatson音声関連API
PepperとWatson音声関連APIPepperとWatson音声関連API
PepperとWatson音声関連API
 
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...
 
해커에게 전해들은 머신러닝 #4
해커에게 전해들은 머신러닝 #4해커에게 전해들은 머신러닝 #4
해커에게 전해들은 머신러닝 #4
 

Similar to Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study

An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud Security
IRJET Journal
 
journal paper
journal paperjournal paper
journal paper
rikaseorika
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
IRJET Journal
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
csandit
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
International Journal of Science and Research (IJSR)
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A PerspectiveCloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A Perspective
Cognizant
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
IRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 

Similar to Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study (20)

An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud Security
 
journal paper
journal paperjournal paper
journal paper
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A PerspectiveCloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A Perspective
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290 2779 Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study Alireza Poorebrahimi Department of Information Technology Management Islamic Azad University, Science & Research Branch of Tehran, Iran, Email: poorebrahimi@gmail.com Fatemeh SoleimaniRoozbahani Department of Information Technology Management Islamic Azad University, Science and Research Branch of Tehran, Iran, Email: fa.solaymani@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- The topic of ‘‘the cloud’’ has attracted significant attention throughout the past few years. It allows resource sharing that includes software, platform and infrastructure by means of virtualization. Cloud Adoption in Oil & Gas companies have approached cloud with caution, but they are increasingly deploying cloud services. Energy companies have carefully weighed whether they should opt for a public cloud versus a private one, and which applications are fit for deployment via the cloud. For the most part, the industry has opted to use cloud for generic purposes. Generic business functions like payroll process and procurement are being run through the cloud, along with customer relationship management, likely through software-as-a-service offerings that have become well- known. Security is as much of an issue in the cloud as it is anywhere else. Different people share different point of view on cloud computing. Some believe it is unsafe to use cloud. Cloud vendors go out of their way to ensure security. This paper aims to understand the effects of security and privacy concerns on educational use of cloud services. This proposed a research model based on Ajzen’s (1991) Theory of Planned Behavior (TPB). Following the TPB, the research developed a model, which posits that staff attitudes predicted by security and privacy perceptions and behavioral intentions are predicted by attitudes towards using cloud services. The Model was assess the based on the data collected by means of survey questionnaires. Results supported the proposed model, validating the predictive power of the TPB. Keywords - Cloud services; Privacy; Security; Energy Industry, Oil and Gas. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Dec 14, 2015 Date of Acceptance: Dec 17, 2015 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Information Technology (IT) has been adding significant benefits to various aspects of people’s life, either in terms of convenience or comfort or entertainment [1]. In other side, the present competitive environment, companies are wondering how to reduce their IT costs while increasing their efficiency and agility to react when changes in the business processes are required. Cloud Computing is the latest paradigm to optimize the use of IT resources considering “everything as a service” and receiving these services from the Cloud (Internet) instead of owning and managing hardware and software assets [2]. Cloud computing is a pervasive computing paradigm that has revolutionized how computer infrastructure and services are delivered [3]. Cloud computing has been widely adopted by enterprises in their business application in the last decade [4]. Cloud computing has been propounded as a paradigm shift in the delivery of information technology (IT) resources and services. It has been dubbed by proponents of the technology as the fifth utility after water, electricity, gas, and telephone utilities [2]. The topic of ‘‘the cloud’’ has attracted significant attention throughout the past few years [5, 6, 7] and, as a result, academics and trade journals have created several competing definitions of cloud computing [8, 9]. Despite the lack of consensus about definitions, however, there is broad agreement on the growing demand for cloud computing. Some estimates suggest that spending on cloud-related technologies and services in the next few years may climb as high as $42 billion/year [10]. Roster et al. [11] identify three of the more commonly cited reasons for migrating functions and capabilities to the cloud: Cost reduction, Deployment flexibility, Speed to implement [12]. Some industries—most notably, the financial services and telecommunications sectors—have been relatively quick adopters, while others have approached the cloud more cautiously and slowly [12]. Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges—most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in information technology infrastructure—that make a full migration to the public cloud difficult at present [13]. Oil and gas companies have approached cloud with caution, but they are increasingly deploying cloud services. Energy companies have carefully weighed whether they should opt for a public cloud versus a private one, and which applications are fit for deployment via the cloud. For the most part, the industry has opted to use cloud for generic
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290 2780 purposes. For example, cloud is being used or considered for infrastructure such as data backup and archiving and data storage (raw data, backup, archiving, email storage). Generic business functions like payroll process and procurement are being run through the cloud, along with customer relationship management, likely through software-as-a-service offerings that have become well- known. Another fairly generic application is for collaborative applications such as email, group calendaring, and messaging. Entrepreneurial independent upstream oil and gas companies primarily involved in unconventional shale gas and tight oil initiatives have adopted cloud to perform these functions. Because of security considerations, the oil and gas industry generally prefers private cloud over public cloud for core applications [14]. Despite the compelling case for moving towards the cloud, however, the absorption of these technologies and services has been uneven [12]. Most oil and gas companies are balancing the opportunities versus the risks in considering whether to adopt cloud technologies. On the one hand, cloud enables increased collaboration and can result in decreased operational costs due to reduced infrastructure investments, quick deployment, and flexibility of use. That said, security concerns persist over cloud deployment. IT security remains the number one priority for the industry, and many CIOs have had doubts about the security of the cloud and the ability of cloud providers to offer data privacy. However, there is evidence that the industry is becoming more receptive to cloud technologies. Cloud will likely be used in less-sensitive applications. Collaboration is becoming critical for many O&G companies, due to skills shortage, internationalization of operations, and growing importance of collaborative work with business partners. Sensitive information needs to be shared with stakeholders, remote teams, suppliers, and JV partners to maximize productivity and knowledge transfer. Deployment of cloud-based solutions for document management would enhance the collaborative experience and allow the O&G companies to eliminate decentralized systems with a central repository across multiple locations and business units. However, there are also concerns and issues to be solved before Cloud Computing spreads across the different industries [2]. However, some challenges still need to be addressed such as security and privacy issues [15, 16]. Cloud Computing security is the major concern to be addressed nowadays. If security measures are not provided properly for data operations and transmissions then data is at high risk [17]. Since cloud computing provides a facility for a group of users to access the stored data there is a possibility of having high data risk. Strongest security measures are to be implemented by identifying security challenge and solutions to handle these challenges [18]. The paper proceeds as follows. In the second section, the literature on studies of cloud computing adoption and use has been reviewed. The next sessions have been allot to the research methods and the results of data analysis. Finally, discussion of the research findings and their implications are provided along with the limitations of the study. II. LITERATURE REVIEW Cloud computing has recently received increasing attention in information systems and computer science disciplines [19]. Movahedisefat et al. [20] proposed one of the most pervasive and fundamental challenges for organizations in demonstrating policy compliance is proving that the physical and virtual infrastructure of the cloud can be trusted—particularly when those infrastructure components are owned and managed by external service providers. The next frontier in cloud security and compliance will be to create transparency at the bottom-most layers of the cloud by developing the standards, tools, and linkages to monitor and prove that the cloud’s physical and virtual machines are actually performing as they should [20]. Pearson [21] claims some core traditional mechanisms for addressing privacy (such as model contracts) are no longer flexible or dynamic enough, so new approaches need to be developed to fit this new paradigm. He assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed [21]. Yu et al. [17] addressed the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to untrusted cloud servers without disclosing the underlying data contents [17]. Popović [22], discussed about the security issues, requirements and challenges that are faced by cloud service providers during cloud engineering [22]. Sabahi [23] discussed about the security issues, reliability and availability for cloud computing. He also proposed a feasible solution for few security issues [23]. Liu introduced some cloud computing systems and analyzes cloud computing security problems and its strategy according to the cloud computing concepts [24]. It is obvious as the enthusiasm for utilize the cloud is very high, the concerns about its challenges, particularly its security, is high, therefore the security is a factor which affects the using cloud computing. III. RESEARCH METHODOLOGY Theory of planned behavior (TPB), a prominent reasoned action model, its conceptual foundation, its intellectual
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290 2781 history, and the research it has generated. From its roots in propositional control and expectancy theory, the TPB From its roots in propositional control and expectancy theory, the TPB. According to the theory, intention is the immediate antecedent of behavior and is itself a function of attitude towards the behavior, subjective norm, and perceived behavior control; and these determinants follow, respectively, from beliefs about the behavior`s likely consequences, about normative expectations of important others, and about the presence of factors that control behavioral performances [25]. In TPB, beliefs that are specific to each situation are antecedent to attitude. The theory does not assume that beliefs that apply in one context also apply in other contexts. Likewise, TPB taps the important control variables for each situation independently and is more likely to capture situation specific factors [26]. Security and privacy perception is significant predictors of attitude towards using the cloud services in an Energy Industry can be considered in the model. In an attempt to ensure content validity and face validity, the survey instrument was developed based on questionnaire items that had been successfully used in prior studies. The factors which play a fundamental role in the model include: Security and privacy, Attitude, Behavioral intention. Security refers to the degree to which students believe that cloud services are secure platforms for storing and sharing sensitive data. Attitude towards using technology is defined as students’ overall affective reaction to using cloud service [27]. Behavioral intention refers to the degree to which a student has formulated conscious plans to use or not use cloud services in the future [28]. Based on the factors, the hypothesizes are: H1. Perceived security and privacy will have a positive influence on attitude. H2. Attitude will have a significant positive influence on behavioral intention. H3. Behavioral intention will have a significant positive influence on use of cloud services in Energy Industry (Fig 1). Fig 1. Model of Research IV. METHODOLOGY Based on the feedback from expert panel, modifications were done on the survey instrument. The instrument has total 16 Likert items, including 5 items for security- privacy, 4 items for use, 4 items for behavioral intention, and 3 items for attitude. Participants were asked to indicate their level of agreement using a five-point scale ranging from ‘‘strongly agree’’ to ‘‘strongly disagree.’’ In total, 50 randomly selected members of an Oil and Gas company (which wants to be anonymous). However, 5 questionnaires were discarded from data set. Prior to conducting factor analysis, data set was checked for suitability for factor analysis. After the data set was checked for factorability, 19 items were subjected to factor analysis. We conducted an exploratory factor analysis using principal components extraction to test construct validity of the scale. Based on the results of the exploratory factor analysis, 3 questionnaire items were omitted from the scale. The Bartlett’s test of Sphericity indicated that the measures for four latent constructs were interdependent and the KMO measure of sampling adequacy was well above the minimally accepted level of .50. On the basis of a scree plot of eigenvalues, a one- factor solution appeared to be most appropriate for each measurement. For each measurement, total variance explained ranged between 49.74 and 74.95, which are all much higher than acceptable value of .40 for measures with one factor Moreover, each measurement item has a factor loading above .71 and communality value above .50. Factor loadings, which are all much higher than acceptable value of .40, ensure that factor structures are robust. The corrected item-total correlation coefficients ranged from .49 to .80, indicating acceptable to high homogeneity of the items. V. DISCUSSION AND FINDINGS This paper extends Ajzen’s (1991) Theory of Planned Behavior (TPB) to explain and predict educational use of cloud services by pre-service teachers. Following the TPB, we developed a research model, which posits that student attitudes predicted by security and privacy perceptions and behavioral intentions are predicted by attitudes towards using cloud services. The findings supported the proposed model, validating the predictive power of the TPB. The findings stressed the importance of security and privacy variable, which add to the explanatory and predictive power of the model, in predicting attitudes towards using cloud services, justifying the integration of this variable within the TPB framework. The study hypothesized that security and privacy have a positively significant influence on staffs` attitudes towards using cloud services. The results, along with previous studies, support this hypothesis. This study has shown that security and privacy perceptions have a significant influence on attitude. Security variable has been found in
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290 2782 prior studies as a significant predictor of adoption behavior, for example Salisbury et al. (2001) found that perceived security is a strong predictor of intention to purchase online. Zhu et al. (2006) found that security perception has a significant effect on e-business adoption. Dillon et al. (2010) found that security issues have an important role in hindering cloud computing. Lin and Chen (2012) argued that challenges of cloud computing are security and standardization. More recently, Park and Kim (2014) found that user acceptance of mobile cloud services is largely affected by security, perceived mobility, quality of service, connectedness, and satisfaction. The results of the study supported assumptions of Theory of Planned Behavior that we based our study on. This suggests that the assumptions of this theory can be used to explain the nature of educational use of similar technologies. The present study may also contribute to the literature since the study on oil and gas industry use of cloud services is limited. The security and privacy variables were found to be a strong determinant of oil and gas industry use of cloud services. Therefore, these variables should be taken into account in future researches on use of similar technologies. Moreover, the results demonstrated that attitude has a stronger effect on oil and gas industry use of cloud services than behavioral intention. Thus, future studies may focus on the effect of attitude on oil and gas industry use of such services to develop a more parsimony model that efficiently predicts usage. REFERENCES [1] O. Ali and J. Soar, "Challenges and Issues Within Cloud Computing Technology," CLOUD COMPUTING : The Fifth International Conference on Cloud Computing, GRIDs, and Virtualization, 2014 . [2] C. R. Monroy, C. A. Arias and Y. N. Guerrero, "The new cloud computing paradigm: the way to IT seen as a utility," Latin American and Caribbean Journal of Engineering Education, 6(2), 2013. [3] H. M. Sabi, F.-M. E. Uzoka, K. Langmia and F. N. Njehda, "Conceptualizing a model for adoption of cloud computing in education," International Journal of Information Management 36, p. 183–191, 2016. [4] S. Nepal and S. Pandey, "Guest Editorial: Cloud Computing and Scientific Applications (CCSA)—Big Data Analysis in the Cloud," The Computer Journal Advance Access published February 1, 2015. [5] S. Cherry, "Forecast for cloud computing: up, up, and away.," IEEE Spectrum 46, 2009. [6] M.-H. Kuo, A. Kushniruk and E. Borycki, "Can cloud computing benefit health services? A SWOT analysis," Studies in Health Technology and Informatics 169, p. 379–383, 2011. [7] T. Sterling and D. Stark, "A high-performance computing forecast: partly cloudy," Computing in Science & Engineering 11(4), p. 42–49, 2009. [8] K. Kushida, J. Murray and J. Zysman, "Diffusing the cloud: cloud computing and implications for public policy," JournalofIndustry, Competition and Trade 11(3), p. 209–237, 2011. [9] H. R. Motahari-Nezhad, B. Stephenson and S. Singhal, "Outsourcing Business to Cloud Computing Services: Opportunities and Challenges," IEEE Internet Computing, Special Issue on Cloud Computing, 2009. [10] R. Buyya, S. Pandey and C. Vecchiola, "Cloudbus toolkit for market-oriented cloud computing," Cloud Computing Springer Berlin Heidelberg, pp. 24-44, 2009. [11] J. Roster, C. Moore, and K. Pfeiler, "Who really cares about the cloud? An industry perspective," Paper presented at the Gartner Webinar, August 24, 2010. [12] R. K.Perrons and A. Hems, "Cloud computingin the upstream oil & gas industry: Aproposed way forward," Energy Policy, vol. 56, p. 732–737, 2013. [13] R. K. Perrons and A. Hems, "Cloud computing in the upstream oil & gas industry: A proposed way forward," Energy Policy 56, p. 732–737, 2013. [14] "Migrat ing to Cloud: The Business Value for Oil," IDC Energy Insights, 2014. [15] T. Dillon, C. Wu and E. Chang, "Cloud computing: Issues and challenges," In 24th IEEE international conference on advanced information networking and applications, 2010. [16] E. Park and K. J. Kim, "An ıntegrated adoption model of mobile cloud services: Exploration of key determinants and extension of technology acceptance model," Telematics and Informatics, 31(3), p. 376– 385, 2014. [17] S. Yu, C. Wang, K. Ren and W. Lou, "Achieving secure, scalable and fine-grained data access control in cloud computing," IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2010 proceedings, pp. 1-9, 2010.
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290 2783 [18] R. V. Rao and K. Selvamani, "Data Security Challenges and Its Solutions in Cloud Computing," Procedia Computer Science 48, p. 204 – 209, 2015. [19] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing," UC Berkeley Reliable Adaptive Distributed Systems Laboratory, 2009. [20] M. R. Movahedisefat, S. M. R. Farshchi and D. Mohammadpur, "Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure," Emerging Trends in ICT Security, 2014. [21] S. Pearson, "Privacy, Security and Trust in Cloud Computing," Computer Communications and Networks, pp. 4471-4189, 2013. [22] K. Popović, "Cloud computing security issues and challenges," In MIPRO, 2010 proceedings of the 33rd international convention IEEE, pp. 344-349, 2010. [23] F. Sabahi, "Cloud computing security threats and responses," In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on IEEE, pp. 245-249, 2011. [24] W. Liu, "Research on Cloud Computing Security Problem and Strategy," In Consumer Electronics, Communications and Networks (CECNet), 2nd International Conference on IEEE, pp. 1216-1219, 2012. [25] I. Ajzen, "Theory of planned behavior, Handb Theor Soc Psychol Vol One, 2011. [26] K. Mathieson, "Predicting user intentions: Comparing the technology," Information Systems Research, 2(3), p. 173–191, 1991. [27] V. Venkatesh and H. Bala, "Technology acceptance model 3 and a research agenda on interventions," Decision sciences, 39(2), pp. 273-315, 2008. [28] P. R. Warshaw and F. D. Davis, "Disentangling behavioral intention and behavioral expectation," Journal of experimental social psychology, 21(3), pp. 213-228, 1985. Biographies and Photographs Professor Alireza Poorebrahimi, has obtained Ph. D. degree in Industrial Management from SRBIA University in 1993. His research fields are Network Security Management, Passive Defense, Cloud Computing, e-Banking and e- Commerce. He is appointed as a Professor in the SRBIA University, Deptt. of Management. Miss.Fatemeh Soleimani Roozbahani has obtained B.S. degree in Nuclear Physics from Shahid Chamran University in 2009, and has obtained Master degree in Information Technology Management summa cum laude with a cumulative GPA of 19.76 [out of 20] amongst the graduates of this major who had been graduated in 2011 from Farabi University. Presently she is pursuing Ph.D. in Information Technology Management in SRBIA University. Her research fields are Information Business Intelligence, Deep Learning, Cloud Computing, and Security in Computer Networks. She is appointed as a Lecturer in Azad University, Deptt. of Information Technology.