scholarly journals State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions

2014 ◽  
Vol 37 ◽  
pp. 357-362 ◽  
Author(s):  
Farrukh Shahzad
2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


2015 ◽  
Vol 77 (18) ◽  
Author(s):  
Hanifah Abdul Hamid ◽  
Mokhtar Mohd Yusof

Cloud computing has made a significant transformation of information technology environment as well as the way the business is conducted in any organizations. While its advantages are obvious, its challenges need to be clearly addressed to ensure successful adoption. This article provides an insights of cloud computing adoption in Malaysia at the national level as well as a review of cloud adoption from various fields and domains in Malaysia which led to research direction in the future. Malaysia is being dedicated towards cloud adoption nationally, and keep its good progress to equip itself as a cloud-friendly country. However, security challenges seem to slow down the effort, thus these need to be dealt with properly. 


Author(s):  
Wenjuan Xu ◽  
Brian Groves ◽  
Willson Kwok

<p><strong> </strong></p><p>The cloud computing techniques bring different security challenges. In this paper, we set up ownCloud as the example cloud computing infrastructure. Then we present our work process and results of a series of penetration testing performed on the ownCloud.  We also analyse these results and give key recommendations for addressing the identified vulnerabilities.</p><p> </p><p> Keywords: cloud computing, security, penetration tesing, owncloud</p>


IARJSET ◽  
2020 ◽  
Vol 7 (8) ◽  
pp. 120-123
Author(s):  
Nada Alrehaili ◽  
Agadee Mutaha

Author(s):  
Anas Bouayad ◽  
Asmae Blilat ◽  
Nour El Houda Mejhed ◽  
Mohammed El Ghazi

Sign in / Sign up

Export Citation Format

Share Document