Security Threats and Solutions in Cloud Computing

被引:0
|
作者
Eken, Hamm [1 ]
机构
[1] Gazi Univ, Inst Informat, Ankara, Turkey
关键词
Cloud computing; Cloud computing security; Risk management; Information Security; Critical infrastructures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Technology infrastructure continues to grow with evolving technology. The invention of the Internet has increased the use of computer and the mobile device. Nowadays, many people in the world use these devices. As a result, a large amount of data stored device and each device in the Internet were required to be connected each other because of sharing information. New business model has emerged with the increase of data and the development of Internet and mobile technology. This new business model is referred to as cloud computing. The cloud computing offers many advantages, but there are also many disadvantages. The advantages are flexibility and scalability and better security and large enterprises. This paper identifies security threats focused on cloud computing which is an essential part of the companies that want to use cloud computing services. The fundamental risk factors particular to the cloud are elaborated. Finally, this paper provides some solutions about security threats for enterprise and service provider for the cloud computing deployment in order to provide the security of information. This paper does not mention new idea or innovation about cloud computing. Purpose of this study is intended to be a guide for people who is interested in cloud computing and want to take advantage of the cloud computing services.
引用
收藏
页码:139 / 143
页数:5
相关论文
共 50 条
  • [1] Various Security Threats and Their Solutions In Cloud Computing
    Barnwal, Anil
    Pugla, Satyakam
    Jangade, Rajesh
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 758 - 764
  • [2] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71
  • [3] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [4] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [5] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [6] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [7] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [8] A survey on security challenges in cloud computing: issues, threats, and solutions
    Tabrizchi, Hamed
    Kuchaki Rafsanjani, Marjan
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (12): : 9493 - 9532
  • [9] CLOUD COMPUTING OVERVIEW, SECURITY THREATS AND SOLUTIONS-A SURVEY
    VasanthaAzhagu, A. Kannaki
    Gnanasekar, J. M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [10] Security threats of virtualization in cloud computing
    Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):