Security Threats and Solutions in Cloud Computing

被引:0
|
作者
Eken, Hamm [1 ]
机构
[1] Gazi Univ, Inst Informat, Ankara, Turkey
关键词
Cloud computing; Cloud computing security; Risk management; Information Security; Critical infrastructures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Technology infrastructure continues to grow with evolving technology. The invention of the Internet has increased the use of computer and the mobile device. Nowadays, many people in the world use these devices. As a result, a large amount of data stored device and each device in the Internet were required to be connected each other because of sharing information. New business model has emerged with the increase of data and the development of Internet and mobile technology. This new business model is referred to as cloud computing. The cloud computing offers many advantages, but there are also many disadvantages. The advantages are flexibility and scalability and better security and large enterprises. This paper identifies security threats focused on cloud computing which is an essential part of the companies that want to use cloud computing services. The fundamental risk factors particular to the cloud are elaborated. Finally, this paper provides some solutions about security threats for enterprise and service provider for the cloud computing deployment in order to provide the security of information. This paper does not mention new idea or innovation about cloud computing. Purpose of this study is intended to be a guide for people who is interested in cloud computing and want to take advantage of the cloud computing services.
引用
收藏
页码:139 / 143
页数:5
相关论文
共 50 条
  • [31] Security Issues and Threats According to the Attribute of Cloud Computing
    Lee, Hyangjin
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 101 - +
  • [32] Security Threats in Cloud Computing Models: Domains and Proposals
    Revoredo da Silva, Carlo Marcelo
    Costa da Silva, Jose Lutiano
    Rodrigues, Ricardo Batista
    Medeiros Campos, Glaucia Melissa
    do Nascimento, Leandro Marques
    Garcia, Vinicius Cardoso
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 383 - 389
  • [33] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [34] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [35] Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) : 50 - 64
  • [36] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419
  • [37] Security in Cloud Computing approaches and solutions
    Ennajjar, I.
    Tabii, Y.
    Benkaddour, A.
    2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, : 57 - 61
  • [38] Security Issues and Solutions in Cloud Computing
    Xie, Yujie
    Lee, Yeonju
    Kim, Kwangmin
    Kim, Pankoo
    INTELLIGENT ENVIRONMENTS 2017, 2017, 22 : 175 - 181
  • [39] A Case Study for the Cloud Computing Security Threats in a Governmental Organization
    Albakri, Sameer Hasan
    Shanmgam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 452 - 457
  • [40] Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures
    Brohi, Sarfraz Nawaz
    Bamiah, Mervat Adib
    Brohi, Muhammad Nawaz
    Kamran, Rukshanda
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 151 - 155