IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
View Sample PDF
Author(s): Marwan Omar (Nawroz University, Iraq)
Copyright: 2015
Pages: 9
Source title: Handbook of Research on Security Considerations in Cloud Computing
Source Author(s)/Editor(s): Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia)and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
DOI: 10.4018/978-1-4666-8387-7.ch002

Purchase

View Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

The focus of this chapter is to highlight and address security challenges associated with the use and adoption of cloud computing. The chapter will describe how cloud computing has become an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information to unauthorized access. Also, this chapter will explore and investigate the scope and magnitude of one of the top cloud computing security threats “abuse and nefarious use of cloud computing” and present some of the attacks specific to this top threat as it represents a major barrier for decision makers to adopting cloud computing model. Finally, this chapter aims to serve as an introductory research effort to warrant more extensive research into this top threat and help researchers make recommendations to business organizations as to whether or not their data are vulnerable to such threat when deciding to join the cloud.

Related Content

A. Ashwini, S. Balasubramaniam, Seifedine Kadry. © 2025. 26 pages.
Bhupinder Singh, Christian Kaunert. © 2025. 20 pages.
A. Ashwini, V. Kavitha, S. Balasubramaniam, B. Sundaravadivazhagan. © 2025. 30 pages.
Abhinav Kumar, Anindya Bag, Aseem Anand, Siddhant Saha, Hitesh Mohapatra, Manjur Kolhar. © 2025. 22 pages.
Bhupinder Singh, Christian Kaunert. © 2025. 22 pages.
M. Abinaya. © 2025. 30 pages.
Dipti Chauhan, Jay Kumar Jain. © 2025. 28 pages.
Body Bottom