Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Khan, N; Al-Yasiri, A (2016)
Publisher: Elsevier
Journal: Procedia Computer Science
Languages: English
Types: Article
Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. Georgios I, Smithson S , Lybereas T, Trends in information technology in small businesses, Idea Group Publishing, UK, ISBN 9781930708044, 2001.
    • 2. Cloud Security Alliance, Security guidance for critical areas of focus in Cloud Computing, V3.0, 2011.
    • 3. Khalid A, Cloud Computing: applying issues in Small Business, International Conference on Signal Acquisition and Processing (ICSAP'10), 2010, pp 278-281.
    • 4. Li W, Ping L, Trust model to enhance Security and interoperability of Cloud environment, Proceedings of the 1st International conference on Cloud Computing. Springer Berlin Heidelberg, Beijing, China, 2009, pp 69-79.
    • 5. Rittinghouse JW, Ransome JF, Security in the Cloud, Cloud Computing. Implementation, Management, and Security, CRC Press, 2009.
    • 6. GiljeJaatun M, Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, Proceedings, December 1-4, 2009. Springer.
    • 7. Anne Thomas M, Cloud Computing: the Gap between Hype and Reality, presentation by VP and Research Director Burton Group ECAR Symposium December 5 Boca Raton FL, USA, 2008.
    • 8. Gillam L, Cloud Computing: Principles, Systems and Applications, 2010,Springer.
    • 9. Yaseen, Qussai, Althebyan Q, Panda B, Jararweh Y, Mitigating insider threat in cloud relational databases, Security and Communication Networks,2016.
    • 10. Hendre A, Joshi KP, A Semantic Approach to Cloud Security and Compliance, 2015 IEEE 8th International Conference on Cloud Computing”, New York City, June 27- July 2, 2015.
    • 11. Al-Ayyoub, Mahmoud, Jararweh Y, Benkhelifa E, Vouk M, Rindos A, SDSecurity: a software defined security experimental framework, In Communication Workshop (ICCW), 2015 IEEE International Conference on, pp. 1871-1876. IEEE, 2015.
    • 12. Damenu TK, Balakrishna C, Cloud Security Risk Management: A Critical Review , 9th International Conference on Next Generation Mobile Applications, Services and Technologies, 2015, 9-11 September.
    • 13. Singh LV, Bole AV, Yadav SK, Security Issues of Cloud Computing- A Survey, International Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 1, January 2015.
    • 14. Varsha Wadhwa A, Gupta S, Study of Security Issues in Cloud Computing, International Journal of Computer Science and Mobile Computing IJCSMC, Vol. 4, Issue. 6, June 2015, pg.230 - 234.
    • 15. Khan N, Yasiri AA, Framework For Cloud Computing Adoption: A RoadMap for SMEs to Cloud Migration,. International Journal on Cloud Computing: Services and Architecture (IJCCSA), 2015, Vol. 5, No. 5/6, December.
    • 16. Himmel MA, Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks, (January 1, 2012). ETD Collection for Pace University. PaperAAI3520142.
    • 17. Nedev S, Exploring the Factors Influencing the Adoption of Cloud Computing and the Challenges Faced by the Business, 2014, Sheffield Hallam university.
    • 18. Walliman.N, Your Undergraduate Dissertation: The Essential Guide for Success. 2nd Edition ed., London, 2012, SAGE PUBLICATION.
    • 19. Cloud Security Alliance, Top Threats to Cloud Computing V1.0., 2010.
    • 20. Dawoud W, Takouna I, Meinel C, Infrastructure as a service security: Challenges and solutions. The 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany. IEEE Computer Society, Washington, DC, USA, 2010, pp 1-8.
    • 21. Carlin S, Curran K, Cloud Computing Security, International Journal of Ambient Computing and Intelligence, 2011, 3(1):38-46.
    • 22. Jansen WA,“Cloud Hooks: Security and Privacy Issues in Cloud Computing, Proceedings of the 44th Hawaii International Conference on System Sciences, Koloa, Kauai, HI. IEEE Computer Society, Washington, DC, USA, 2011, pp 1-10.
    • 23. Grobauer B, Walloschek T, Stocker E, Understanding Cloud Computing vulnerabilities, IEEE Security Privacy, 2011, 9(2):50-57.
    • 24. Ertaul L, Singhal S, Gökay S, Security challenges in Cloud Computing, Proceedings of the 2010 International conference on Security and Management SAM'10. CSREA Press, Las Vegas, US, 2010, pp 36-42.
    • 25. OWASP, The Ten most critical Web application Security risks, 2010.
    • 26. Morsy MAGrundy J, Müller I, An analysis of the Cloud Computing Security problem, Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia, 2010.
    • 27. Yaseen, Qussai, Althebyan Q, Jararweh Y. Pep-side caching: an insider threat port, In Information Reuse and Integration (IRI), 2013 IEEE 14th International Conference on, pp. 137-144. IEEE, 2013.
    • 28. Jasti A, Shah P, Nagaraj R, Pendse R, Security in multi-tenancy cloud, IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA. IEEE Computer Society, Washington, DC, USA,2010, pp 35-41.
    • 29. Winkler V, Securing the Cloud: Cloud computer Security techniques and tactics, Elsevier Inc, Waltham, MA, 2011.
    • 30. Rittinghouse JWRansome JF, Security in the Cloud, Cloud Computing. Implementation, Management, and Security, CRC Press 2007.
    • 31. Wu H, Ding Y, Winer C, Yao L, Network Security for virtual machine in Cloud Computing, 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, 2010, pp 18-21.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article