SEUIR Repository

A prototypical adoption security model for major vulnerabilities in cloud computing

Show simple item record

dc.contributor.author Kumarasinghe, S. G. M. U.
dc.contributor.author Shafana, M. S.
dc.contributor.author Ahamed Sabani, M. J.
dc.date.accessioned 2021-10-04T08:04:05Z
dc.date.available 2021-10-04T08:04:05Z
dc.date.issued 2021-07-27
dc.identifier.citation 1st International Conference on Science and Technology 2021 on “Technology - based research and innovation for empowerment and sustainability ”. 07th July 2021. South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. pp. 184-191 en_US
dc.identifier.isbn 978-624-5736-17-1
dc.identifier.uri http://ir.lib.seu.ac.lk/handle/123456789/5782
dc.description.abstract Companies around the world are speedy in using the cloud to revolutionize their digital transformation initiatives. Cloud Computing enables companies to outsource the entire Information Technology process to stay focused on their core business to improve their productivity and creativity in providing clients with services. It allows companies to reduce the high cost of IT infrastructure without losing attention to customer needs. Although the cloud provides a lot of benefits that attract organizations, data security is one of few things which hold back companies from adopting cloud computing solutions. Cloud infrastructure could be complicated, and where complexity and security issues definitely exist. There exist unique cloud computing security issues in a cloud computing infrastructure. Data are stored in the cloud and accessed through the internet via a third-party provider. This means that there is limited visibility and control over the data, which is not a thing to be ignored. There are many other security threats to cloud computing vulnerabilities that cannot be ignored. This paper is going to describe some of the security threats on cloud computing vulnerabilities and will provide a prototypical model to adopt as a solution to overcome the major vulnerabilities. The goal is to convey the proper information to the users (organizations) who are thinking of deploying clouds for their organizations. This paper will help them to be conscious about opting for a proper cloud service provider and will help them in taking precautions to avoid the security issues. en_US
dc.language.iso en_US en_US
dc.publisher Faculty of Technology, South Eastern University of Sri Lanka, University Park, Oluvil. en_US
dc.subject Cloud computing en_US
dc.subject Threats en_US
dc.subject Security model en_US
dc.subject Vulnerabilities en_US
dc.subject CSP en_US
dc.subject Cloud service provider en_US
dc.title A prototypical adoption security model for major vulnerabilities in cloud computing en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search SEUIR


Advanced Search

Browse

My Account