Cloud Computing: Securing without Losing Control

Almutairi, Mubarak S. (2019) Cloud Computing: Securing without Losing Control. Journal of Advances in Mathematics and Computer Science, 31 (2). pp. 1-9. ISSN 2456-9968

[thumbnail of Almutairi3122019JAMCS47754.pdf] Text
Almutairi3122019JAMCS47754.pdf - Published Version

Download (410kB)

Abstract

Computing virtualization is the key technology in cloud computing as it can reduce the investment in the hardware component drastically. The present research work carefully analyse some of the major security threats to the cloud services based on the security threat analysis produced by Cloud Security Alliance (CSA). The physical network components are not necessarily located on the same geographical area but yet are doing the necessary processing and storage. As such, “cloud computing” will be the driving force behind most of today's promising computing technologies. Security will be always an issue which needs to be addresses at two different levels: front-end and back-end. In a nutshell, cloud computing is hugely beneficial for the enterprise and while still evolving, will be around for the long-term. It is crucially important for those enterprises which will adopt the cloud computing model to put long-term security strategy in place. Knowledge of cloud architecture, technology, process, services, and deployment models is vital in specifying security models and identifying security concerns in cloud computing. As the providers and end users increase, standardization and security techniques will play an important role in helping organizations to reduce risks involved. This survey also illustrates the view of cloud providers’ actions and assessment of the cloud-computing services provided by them to the IT users.

Item Type: Article
Subjects: Afro Asian Archive > Mathematical Science
Depositing User: Unnamed user with email support@afroasianarchive.com
Date Deposited: 06 May 2023 08:11
Last Modified: 12 Aug 2024 11:55
URI: http://info.stmdigitallibrary.com/id/eprint/418

Actions (login required)

View Item
View Item