Cloud – IAAS security threats and its possible mitigations
نویسندگان
چکیده
منابع مشابه
Security checklist for IaaS cloud deployments
In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the elements of the list on a level of abstraction that helps keep the size of the list manageable while preserving the lists practical applicability.
متن کاملEmerging Cloud Computing Security Threats
Cloud computing is one of the latest emerging innovations of the modern internet and technological landscape. With everyone from the White house to major online technological leaders like Amazon and Google using or offering cloud computing services it is truly presents itself as an exciting and innovative method to store and use data on the internet. In this paper, we discuss some of the most k...
متن کاملCloud Computing Security threats and Countermeasures
Introduction Within the last decade, there have been several advances in technology that have created more opportunities for people to communicate around the world. Technology trends have reached not only the enterprise environments, but also in ordinary people's homes. Cloud computing implementation has revolutionized the tech community, and spread throughout the business world. It is no longe...
متن کاملSecurity Threats in Cloud Computing Environments
Cloud computing is a model for enabling service user’s ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security treats and Technical Components of Cloud Computing.
متن کاملIdentifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i1.7.10648