Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework

Article English OPEN
Khan, Nabeel ; Al-Yasiri, Adil (2016)

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing.
  • References (31)
    31 references, page 1 of 4

    1. Georgios I, Smithson S , Lybereas T, Trends in information technology in small businesses, Idea Group Publishing, UK, ISBN 9781930708044, 2001.

    2. Cloud Security Alliance, Security guidance for critical areas of focus in Cloud Computing, V3.0, 2011.

    3. Khalid A, Cloud Computing: applying issues in Small Business, International Conference on Signal Acquisition and Processing (ICSAP'10), 2010, pp 278-281.

    4. Li W, Ping L, Trust model to enhance Security and interoperability of Cloud environment, Proceedings of the 1st International conference on Cloud Computing. Springer Berlin Heidelberg, Beijing, China, 2009, pp 69-79.

    5. Rittinghouse JW, Ransome JF, Security in the Cloud, Cloud Computing. Implementation, Management, and Security, CRC Press, 2009.

    6. GiljeJaatun M, Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, Proceedings, December 1-4, 2009. Springer.

    7. Anne Thomas M, Cloud Computing: the Gap between Hype and Reality, presentation by VP and Research Director Burton Group ECAR Symposium December 5 Boca Raton FL, USA, 2008.

    8. Gillam L, Cloud Computing: Principles, Systems and Applications, 2010,Springer.

    9. Yaseen, Qussai, Althebyan Q, Panda B, Jararweh Y, Mitigating insider threat in cloud relational databases, Security and Communication Networks,2016.

    10. Hendre A, Joshi KP, A Semantic Approach to Cloud Security and Compliance, 2015 IEEE 8th International Conference on Cloud Computing”, New York City, June 27- July 2, 2015.

  • Metrics
    No metrics available
Share - Bookmark