Reference Hub8
Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities

Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities

Kamal Dahbur, Bassil Mohammad, Ahmad Bisher Tarakji
Copyright: © 2011 |Volume: 1 |Issue: 3 |Pages: 11
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781613505977|DOI: 10.4018/ijcac.2011070101
Cite Article Cite Article

MLA

Dahbur, Kamal, et al. "Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities." IJCAC vol.1, no.3 2011: pp.1-11. http://doi.org/10.4018/ijcac.2011070101

APA

Dahbur, K., Mohammad, B., & Tarakji, A. B. (2011). Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities. International Journal of Cloud Applications and Computing (IJCAC), 1(3), 1-11. http://doi.org/10.4018/ijcac.2011070101

Chicago

Dahbur, Kamal, Bassil Mohammad, and Ahmad Bisher Tarakji. "Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities," International Journal of Cloud Applications and Computing (IJCAC) 1, no.3: 1-11. http://doi.org/10.4018/ijcac.2011070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.