dc.contributor.author |
Kumarasinghe, S. G. M. U. |
|
dc.contributor.author |
Shafana, M. S. |
|
dc.contributor.author |
Ahamed Sabani, M. J. |
|
dc.date.accessioned |
2021-10-04T08:04:05Z |
|
dc.date.available |
2021-10-04T08:04:05Z |
|
dc.date.issued |
2021-07-27 |
|
dc.identifier.citation |
1st International Conference on Science and Technology 2021 on “Technology - based research and innovation for empowerment and sustainability ”. 07th July 2021. South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. pp. 184-191 |
en_US |
dc.identifier.isbn |
978-624-5736-17-1 |
|
dc.identifier.uri |
http://ir.lib.seu.ac.lk/handle/123456789/5782 |
|
dc.description.abstract |
Companies around the world are speedy
in using the cloud to revolutionize their digital
transformation initiatives. Cloud Computing
enables companies to outsource the entire
Information Technology process to stay focused
on their core business to improve their
productivity and creativity in providing clients
with services. It allows companies to reduce the
high cost of IT infrastructure without losing
attention to customer needs. Although the cloud
provides a lot of benefits that attract
organizations, data security is one of few things
which hold back companies from adopting cloud
computing solutions. Cloud infrastructure could
be complicated, and where complexity and
security issues definitely exist. There exist unique
cloud computing security issues in a cloud
computing infrastructure. Data are stored in the
cloud and accessed through the internet via a
third-party provider. This means that there is
limited visibility and control over the data, which
is not a thing to be ignored. There are many other
security threats to cloud computing vulnerabilities
that cannot be ignored. This paper is going to
describe some of the security threats on cloud
computing vulnerabilities and will provide a
prototypical model to adopt as a solution to
overcome the major vulnerabilities. The goal is to
convey the proper information to the users
(organizations) who are thinking of deploying
clouds for their organizations. This paper will
help them to be conscious about opting for a
proper cloud service provider and will help them
in taking precautions to avoid the security issues. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
Faculty of Technology, South Eastern University of Sri Lanka, University Park, Oluvil. |
en_US |
dc.subject |
Cloud computing |
en_US |
dc.subject |
Threats |
en_US |
dc.subject |
Security model |
en_US |
dc.subject |
Vulnerabilities |
en_US |
dc.subject |
CSP |
en_US |
dc.subject |
Cloud service provider |
en_US |
dc.title |
A prototypical adoption security model for major vulnerabilities in cloud computing |
en_US |
dc.type |
Article |
en_US |