Abstract
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.
Original language | English |
---|---|
Title of host publication | Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 423-428 |
Number of pages | 6 |
ISBN (Electronic) | 9781467376945 |
DOIs | |
Publication status | Published - Oct 28 2015 |
Event | 7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 - Taipei, Taiwan, Province of China Duration: Sept 2 2015 → Sept 4 2015 |
Other
Other | 7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 |
---|---|
Country/Territory | Taiwan, Province of China |
City | Taipei |
Period | 9/2/15 → 9/4/15 |
Keywords
- cloud computing
- frameworks
- models
- Oman
- threats
- vulnerabilities
ASJC Scopus subject areas
- Computer Networks and Communications
- Computer Science Applications
- Hardware and Architecture
- Artificial Intelligence