Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5782
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumarasinghe, S. G. M. U.-
dc.contributor.authorShafana, M. S.-
dc.contributor.authorAhamed Sabani, M. J.-
dc.date.accessioned2021-10-04T08:04:05Z-
dc.date.available2021-10-04T08:04:05Z-
dc.date.issued2021-07-27-
dc.identifier.citation1st International Conference on Science and Technology 2021 on “Technology - based research and innovation for empowerment and sustainability ”. 07th July 2021. South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. pp. 184-191en_US
dc.identifier.isbn978-624-5736-17-1-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/5782-
dc.description.abstractCompanies around the world are speedy in using the cloud to revolutionize their digital transformation initiatives. Cloud Computing enables companies to outsource the entire Information Technology process to stay focused on their core business to improve their productivity and creativity in providing clients with services. It allows companies to reduce the high cost of IT infrastructure without losing attention to customer needs. Although the cloud provides a lot of benefits that attract organizations, data security is one of few things which hold back companies from adopting cloud computing solutions. Cloud infrastructure could be complicated, and where complexity and security issues definitely exist. There exist unique cloud computing security issues in a cloud computing infrastructure. Data are stored in the cloud and accessed through the internet via a third-party provider. This means that there is limited visibility and control over the data, which is not a thing to be ignored. There are many other security threats to cloud computing vulnerabilities that cannot be ignored. This paper is going to describe some of the security threats on cloud computing vulnerabilities and will provide a prototypical model to adopt as a solution to overcome the major vulnerabilities. The goal is to convey the proper information to the users (organizations) who are thinking of deploying clouds for their organizations. This paper will help them to be conscious about opting for a proper cloud service provider and will help them in taking precautions to avoid the security issues.en_US
dc.language.isoen_USen_US
dc.publisherFaculty of Technology, South Eastern University of Sri Lanka, University Park, Oluvil.en_US
dc.subjectCloud computingen_US
dc.subjectThreatsen_US
dc.subjectSecurity modelen_US
dc.subjectVulnerabilitiesen_US
dc.subjectCSPen_US
dc.subjectCloud service provideren_US
dc.titleA prototypical adoption security model for major vulnerabilities in cloud computingen_US
dc.typeArticleen_US
Appears in Collections:1st International Conference on Science and Technology

Files in This Item:
File Description SizeFormat 
24 P_ICST2021 Final v11_win_Done_sec_p184-191.pdf445.52 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.