阿曼云计算安全威胁与漏洞分析

Amira M. AlZadjali, A. Al-Badi, Saqib Ali
{"title":"阿曼云计算安全威胁与漏洞分析","authors":"Amira M. AlZadjali, A. Al-Badi, Saqib Ali","doi":"10.1109/INCoS.2015.79","DOIUrl":null,"url":null,"abstract":"Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman\",\"authors\":\"Amira M. AlZadjali, A. Al-Badi, Saqib Ali\",\"doi\":\"10.1109/INCoS.2015.79\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.\",\"PeriodicalId\":345650,\"journal\":{\"name\":\"2015 International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2015.79\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2015.79","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

云计算技术以其潜在优势而闻名,这些优势包括降低成本、增强灵活性、提高稳定性和提供一个经过验证的交付平台,用于向最终用户交付IT服务。尽管有许多好处,但云计算确实会带来安全威胁,因此存在漏洞。了解和减轻这些威胁和脆弱性对其继续存在至关重要。本研究的主要目的是探索与阿曼不同组织采用的云计算技术相关的各种威胁和漏洞,从而提出缓解这些威胁和漏洞的解决方案。为了实现本研究的研究目的,对云计算用户和提供商进行了调查。主要调查结果表明,数据控制和隐私、安全风险和安全威胁对云计算的实施构成了相当大的障碍。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信