Abstract
Cloud computing refers to highly scalable computing applications, storage, and platforms delivered as services to companies, individuals, and governments. Small and Medium Business (SMB) organizations are increasingly adopting cloud computing to reduce costs and improve efficiency in their operations. While the benefits and robustness of cloud services are well understood, concerns about security remain significant, raising the question of how secure the cloud computing environment truly is. Security is considered one of the main barriers to the continued growth of cloud computing, as many enterprises and individuals hesitate to deploy their data and applications in the cloud due to potential risks. This paper aims to identify major security risks and issues that need to be considered during the deployment and development of cloud services, along with strategies to mitigate them. However, it is important to recognize that cloud computing is not inherently insecure; rather, it requires proper management and secure access practices.
Additional Details
License
CC BY 40
References (6)
- [1]S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, Issue 1, pp. 1-11, 2011.
- [2]M.Carroll, A.Van der Merwe, P.Kotze, Secure cloud computing: Benefits, risks and controls, Information Security South Africa (ISSA), pp. 1-9, September 2011.
- [3]S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, Issue 1, pp. 1-11, July 2010.
- [4]D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, 2011.
- [5]National Institute of Standards and Technology, NIST Cloud Computing Program, 2010 Link
- [6]Chonka, Y. Xiang, W. Zhou, A. Bonti, Cloud security defence to protect cloud computing against HTTP-DOS and XML-Dos attacks, Journal o Network and Computer Applications, vol. 34, pp. 1097-1107, 2010.
About this paper
Keywords
Publish with us
Submit your research to MUJ General. Join our community of researchers and share your work with the academic world.
Get started




