An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman

被引:4
|
作者
AlZadjali, Amira M. [1 ]
Al-Badi, Ali H. [1 ]
Ali, Saqib [1 ]
机构
[1] Sultan Qaboos Univ, Coll Econ & Polit Sci, Dept Informat Syst, Muscat, Oman
关键词
cloud computing; threats; vulnerabilities; frameworks; models; Oman;
D O I
10.1109/INCoS.2015.79
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [41] Security analysis of vulnerabilities and threats for medical information systems
    Ju, Tea Kyung
    Hong, Chong Min
    Shin, Weon
    ICIC Express Letters, 2015, 9 (03): : 849 - 854
  • [42] Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing
    Bhagat, Swapnil P.
    Patil, Vikram S.
    Meshram, Bandu B.
    INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 625 - 634
  • [43] Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics
    Girma, Anteneh
    Garuba, Mosses
    Li, Jiang
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 206 - 211
  • [44] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [45] A Case Study for the Cloud Computing Security Threats in a Governmental Organization
    Albakri, Sameer Hasan
    Shanmgam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 452 - 457
  • [46] Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures
    Brohi, Sarfraz Nawaz
    Bamiah, Mervat Adib
    Brohi, Muhammad Nawaz
    Kamran, Rukshanda
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 151 - 155
  • [47] The Threats of Security on o Virt Private Cloud Computing Platform
    Fan, ZhengLe
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 419 - 421
  • [48] Cyber security threats, challenges and defence mechanisms in cloud computing
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    IET COMMUNICATIONS, 2020, 14 (07) : 1185 - 1191
  • [49] CLOUD COMPUTING OVERVIEW, SECURITY THREATS AND SOLUTIONS-A SURVEY
    VasanthaAzhagu, A. Kannaki
    Gnanasekar, J. M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [50] Dissection and Proposal of Multitudinal Security Threats and Menace in Cloud Computing
    Rawat, Seema
    Dhruv, Bhawna
    Kumar, Praveen
    Mittal, Payal
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 123 - 128