@inproceedings{cd30565f47f54c8aafaac600c884c870,
title = "An analysis of the security threats and vulnerabilities of cloud computing in Oman",
abstract = "Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.",
keywords = "Oman, cloud computing, frameworks, models, threats, vulnerabilities",
author = "Alzadjali, {Amira M.} and Al-Badi, {Ali H.} and Saqib Ali",
note = "Publisher Copyright: {\textcopyright} 2015 IEEE.; 7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 ; Conference date: 02-09-2015 Through 04-09-2015",
year = "2015",
month = oct,
day = "28",
doi = "10.1109/INCoS.2015.79",
language = "English",
series = "Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "423--428",
editor = "Fatos Xhafa and Leonard Barolli",
booktitle = "Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015",
}