The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Secure Architecture for Cloud Environment
|
Author(s): Kashif Munir (Malaysia University of Science and Technology, Malaysia)and Sellapan Palaniappan (Malaysia University of Science and Technology, Malaysia)
Copyright: 2015
Pages: 15
Source title:
Handbook of Research on Security Considerations in Cloud Computing
Source Author(s)/Editor(s): Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia)and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
DOI: 10.4018/978-1-4666-8387-7.ch004
Purchase
|
Abstract
Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.
Related Content
A. Ashwini, S. Balasubramaniam, Seifedine Kadry.
© 2025.
26 pages.
|
Bhupinder Singh, Christian Kaunert.
© 2025.
20 pages.
|
A. Ashwini, V. Kavitha, S. Balasubramaniam, B. Sundaravadivazhagan.
© 2025.
30 pages.
|
Abhinav Kumar, Anindya Bag, Aseem Anand, Siddhant Saha, Hitesh Mohapatra, Manjur Kolhar.
© 2025.
22 pages.
|
Bhupinder Singh, Christian Kaunert.
© 2025.
22 pages.
|
M. Abinaya.
© 2025.
30 pages.
|
Dipti Chauhan, Jay Kumar Jain.
© 2025.
28 pages.
|
|
|