An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman

被引:4
|
作者
AlZadjali, Amira M. [1 ]
Al-Badi, Ali H. [1 ]
Ali, Saqib [1 ]
机构
[1] Sultan Qaboos Univ, Coll Econ & Polit Sci, Dept Informat Syst, Muscat, Oman
关键词
cloud computing; threats; vulnerabilities; frameworks; models; Oman;
D O I
10.1109/INCoS.2015.79
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [21] Various Security Threats and Their Solutions In Cloud Computing
    Barnwal, Anil
    Pugla, Satyakam
    Jangade, Rajesh
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 758 - 764
  • [22] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [23] A survey on top security threats in cloud computing
    Kazim, Muhammad
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (03) : 109 - 113
  • [24] Cloud Computing Threats and Provider Security Assessment
    Yu, Huiming
    Williams, Ken
    Yuan, Xiaohong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 238 - 250
  • [25] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [26] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
  • [27] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562
  • [28] A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges
    Tahirkheli, Abeer Iftikhar
    Shiraz, Muhammad
    Hayat, Bashir
    Idrees, Muhammad
    Sajid, Ahthasham
    Ullah, Rahat
    Ayub, Nasir
    Kim, Ki-Il
    ELECTRONICS, 2021, 10 (15)
  • [29] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71
  • [30] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537