Yara AlHumaidan, Lama AlAjmi, Moudhi M. Aljamea, M. Mahmud
{"title":"ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA","authors":"Yara AlHumaidan, Lama AlAjmi, Moudhi M. Aljamea, M. Mahmud","doi":"10.1109/HealthCom.2018.8531141","DOIUrl":null,"url":null,"abstract":"The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud computing adoption since it promises better scalability over legacy enterprise systems. With all benefits found in cloud technology, there are still some security issues because information and system components are completely controlled by an external company. Most of the discussions on cloud computing security topic are mainly focused on the organizational means to overcome these issues. This paper focusses on the main obstacles to adopting cloud computing technology in Saudi Arabia. It will also cover the technical means to secure cloud computing environment along with real cloud hacking scenarios.","PeriodicalId":232709,"journal":{"name":"2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HealthCom.2018.8531141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud computing adoption since it promises better scalability over legacy enterprise systems. With all benefits found in cloud technology, there are still some security issues because information and system components are completely controlled by an external company. Most of the discussions on cloud computing security topic are mainly focused on the organizational means to overcome these issues. This paper focusses on the main obstacles to adopting cloud computing technology in Saudi Arabia. It will also cover the technical means to secure cloud computing environment along with real cloud hacking scenarios.