The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Secure Architecture for Cloud Environment
|
Author(s): Kashif Munir (Malaysia University of Science and Technology, Malaysia) and Sellapan Palaniappan (Malaysia University of Science and Technology, Malaysia)
Copyright: 2015
Pages: 15
Source title:
Handbook of Research on Security Considerations in Cloud Computing
Source Author(s)/Editor(s): Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
DOI: 10.4018/978-1-4666-8387-7.ch004
Purchase
|
Abstract
Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.
Related Content
Rita Komalasari.
© 2023.
13 pages.
|
Ricardo Alexandre Peixoto de Queiros.
© 2023.
22 pages.
|
Bruno Cunha, Lucas Gonçalves.
© 2023.
23 pages.
|
Manoj Kumar Patra, Anisha Kumari, Bibhudatta Sahoo, Ashok Kumar Turuk.
© 2023.
24 pages.
|
Raquel Simões de Almeida, Tiago Silva.
© 2023.
31 pages.
|
Ranjit Barua, Surajit Das, Jaydeep Mondal.
© 2023.
17 pages.
|
Tatiana Costa, Luis Coelho, Manuel F. Silva.
© 2023.
29 pages.
|
|
|