Mervat Bamiah
Cloud implementation security challenges
Bamiah, Mervat; Brohi, Sarfraz; Chuprat, Suriayati; Brohi, Muhammad Nawaz
Authors
Sarfraz Brohi
Suriayati Chuprat
Muhammad Nawaz Brohi
Abstract
Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcare it is possible to reach large population of people in isolated geographical areas which will assist in saving their lives in critical situations. It enables the use of latest technologies through its various service delivery and deployment models via the internet on pay-per-use billing pattern. However, cloud computing has dark side when it comes to security and privacy considerations. Critical industries such as healthcare and banking are reluctant to trust cloud computing due to the fear of losing their sensitive data, as it resides on the cloud with no knowledge of data location and lack of transparency of Cloud Service Providers (CSPs) mechanisms used to secure their data and applications which have created a barrier against adopting this agile computing paradigm. This paper addresses cloud computing security concerns that must be considered in order to adopt cloud services in information critical industries. © 2012 IEEE.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 |
Start Date | Dec 8, 2012 |
End Date | Dec 10, 2012 |
Acceptance Date | Nov 20, 2012 |
Publication Date | Dec 1, 2012 |
Deposit Date | Sep 9, 2022 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 174-178 |
Book Title | Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 |
ISBN | 978-1-4673-4415-9 |
DOI | https://doi.org/10.1109/ICCCTAM.2012.6488093 |
Keywords | Cloud Computing, Healthcare, Security Challenges, Data privacy, security of data |
Public URL | https://uwe-repository.worktribe.com/output/9942644 |
Publisher URL | https://ieeexplore.ieee.org/document/6488093 |
Related Public URLs | https://ieeexplore.ieee.org/xpl/conhome/6479729/proceeding |
You might also like
UAV’s applications, architecture, security issues and attack scenarios: A survey
(2020)
Book Chapter
A three-level ransomware detection and prevention mechanism
(2020)
Journal Article
A data tracking and monitoring mechanism
(2020)
Book Chapter
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search