An analysis of the security threats and vulnerabilities of cloud computing in Oman

Amira M. Alzadjali, Ali H. Al-Badi, Saqib Ali

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.

Original languageEnglish
Title of host publicationProceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages423-428
Number of pages6
ISBN (Electronic)9781467376945
DOIs
Publication statusPublished - Oct 28 2015
Event7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 - Taipei, Taiwan, Province of China
Duration: Sep 2 2015Sep 4 2015

Other

Other7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015
CountryTaiwan, Province of China
CityTaipei
Period9/2/159/4/15

    Fingerprint

Keywords

  • cloud computing
  • frameworks
  • models
  • Oman
  • threats
  • vulnerabilities

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Artificial Intelligence

Cite this

Alzadjali, A. M., Al-Badi, A. H., & Ali, S. (2015). An analysis of the security threats and vulnerabilities of cloud computing in Oman. In Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 (pp. 423-428). [7312110] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/INCoS.2015.79