Security Threats of Cloud Computing

  • Aawadallah N
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition, countermeasures to cloud security breaches are presented.

Cite

CITATION STYLE

APA

Aawadallah, N. (2015). Security Threats of Cloud Computing. International Journal on Recent and Innovation Trends in Computing and Communication, 3(4), 2393–2397. https://doi.org/10.17762/ijritcc2321-8169.1504133

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free