Cloud Computing – Threats and Challenges

Journal Title: Journal of Computing and Management Studies (JCMS) - Year 2017, Vol 1, Issue 1

Abstract

Recent advances in cloud technologies have gained much eminence in successfully delivering computing services, but yet to receive much needed attention to offer comprehensive evaluation of the existing security and privacy issues. Due to the distributed and dynamic infrastructure, cloud computing has some inherent limitations that easily affect its security attributes. Preliminary studies have showed most of the organizations are reluctant to migrate their assets into cloud mostly because of the security and privacy concerns. The study is to find out all the possible security threats and challenges along with corresponding compromised security attributes in cloud infrastructure. The study will enable any researchers to develop cumulative knowledge for future research extension and evaluation in cloud computing.

Authors and Affiliations

Ishrat Ahmad, Humayun Bakht, Uma Mohan

Keywords

Related Articles

State-Societal System, Values and Culture in New Zealand

New Zealand has observed an uneven history in context to the Muslim population and their relationship with the government. Is Muslim society integrate-able to any state-societal system, values, and culture? This would be...

A Simulation Based Study of Routing Protocols in Mobile Ad-hoc Networks

Mobile ad-hoc is a temporary network without a pre-established infrastructure. Because of the absence of centralized structure, mobile ad hoc networks are facing several problems such as security, routing, limitation of...

Talent Management, Human Resource Management, and Strategic Human Resource Management

Talent Management is often seen and discussed in relation to human resource and strategic human resource management. This makes it difficult to practice talent management theories and models separately to human resource...

Islamic Financing Contracts

Islamic finance has been expanding strongly all over the world during the past few years and shows significant product innovation and sophistication. Shariah-compliant products have proven to be attractive and offer many...

Transition to Islamic Banking

Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunat...

Download PDF file
  • EP ID EP279795
  • DOI -
  • Views 39
  • Downloads 0

How To Cite

Ishrat Ahmad, Humayun Bakht, Uma Mohan (2017). Cloud Computing – Threats and Challenges. Journal of Computing and Management Studies (JCMS), 1(1), 52-74. https://europub.co.uk./articles/-A-279795