Yara AlHumaidan, Lama AlAjmi, Moudhi M. Aljamea, M. Mahmud
{"title":"以沙特阿拉伯为例的云计算安全分析","authors":"Yara AlHumaidan, Lama AlAjmi, Moudhi M. Aljamea, M. Mahmud","doi":"10.1109/HealthCom.2018.8531141","DOIUrl":null,"url":null,"abstract":"The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud computing adoption since it promises better scalability over legacy enterprise systems. With all benefits found in cloud technology, there are still some security issues because information and system components are completely controlled by an external company. Most of the discussions on cloud computing security topic are mainly focused on the organizational means to overcome these issues. This paper focusses on the main obstacles to adopting cloud computing technology in Saudi Arabia. It will also cover the technical means to secure cloud computing environment along with real cloud hacking scenarios.","PeriodicalId":232709,"journal":{"name":"2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA\",\"authors\":\"Yara AlHumaidan, Lama AlAjmi, Moudhi M. Aljamea, M. Mahmud\",\"doi\":\"10.1109/HealthCom.2018.8531141\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud computing adoption since it promises better scalability over legacy enterprise systems. With all benefits found in cloud technology, there are still some security issues because information and system components are completely controlled by an external company. Most of the discussions on cloud computing security topic are mainly focused on the organizational means to overcome these issues. This paper focusses on the main obstacles to adopting cloud computing technology in Saudi Arabia. It will also cover the technical means to secure cloud computing environment along with real cloud hacking scenarios.\",\"PeriodicalId\":232709,\"journal\":{\"name\":\"2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)\",\"volume\":\"74 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HealthCom.2018.8531141\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HealthCom.2018.8531141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA
The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud computing adoption since it promises better scalability over legacy enterprise systems. With all benefits found in cloud technology, there are still some security issues because information and system components are completely controlled by an external company. Most of the discussions on cloud computing security topic are mainly focused on the organizational means to overcome these issues. This paper focusses on the main obstacles to adopting cloud computing technology in Saudi Arabia. It will also cover the technical means to secure cloud computing environment along with real cloud hacking scenarios.