Cloud Computing Understanding Risk, Threats, Vulnerability and Controls: A Survey

  • M.Potey M
  • A Dhote C
  • H. Sharma D
N/ACitations
Citations of this article
29Readers
Mendeley users who have this article in their library.

Abstract

As an embryonic technology, cloud computing has attracted more attention. More and more enterprises or government agencies started to explore cloud computing. However, with the extensive use of cloud computing, security issues came out on a growing scale. This paper highlights and categorizes many of security issues introduced by the "cloud"; surveys the risks, threats, vulnerabilities and controls. Besides, the paper summarizes some corresponding solutions that can help promote the benefits and mitigate the risks associated with Cloud Computing.

Cite

CITATION STYLE

APA

M.Potey, M., A Dhote, C., & H. Sharma, D. (2013). Cloud Computing Understanding Risk, Threats, Vulnerability and Controls: A Survey. International Journal of Computer Applications, 67(3), 9–14. https://doi.org/10.5120/11373-6641

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free