An analysis of the security threats and vulnerabilities of cloud computing in Oman

Amira M. Alzadjali, Ali H. Al-Badi, Saqib Ali

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.

Original languageEnglish
Title of host publicationProceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages423-428
Number of pages6
ISBN (Electronic)9781467376945
DOIs
Publication statusPublished - Oct 28 2015
Event7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 - Taipei, Taiwan, Province of China
Duration: Sep 2 2015Sep 4 2015

Other

Other7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015
CountryTaiwan, Province of China
CityTaipei
Period9/2/159/4/15

Fingerprint

Cloud computing
Cost reduction

Keywords

  • cloud computing
  • frameworks
  • models
  • Oman
  • threats
  • vulnerabilities

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Artificial Intelligence

Cite this

Alzadjali, A. M., Al-Badi, A. H., & Ali, S. (2015). An analysis of the security threats and vulnerabilities of cloud computing in Oman. In Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015 (pp. 423-428). [7312110] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/INCoS.2015.79

An analysis of the security threats and vulnerabilities of cloud computing in Oman. / Alzadjali, Amira M.; Al-Badi, Ali H.; Ali, Saqib.

Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015. Institute of Electrical and Electronics Engineers Inc., 2015. p. 423-428 7312110.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alzadjali, AM, Al-Badi, AH & Ali, S 2015, An analysis of the security threats and vulnerabilities of cloud computing in Oman. in Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015., 7312110, Institute of Electrical and Electronics Engineers Inc., pp. 423-428, 7th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015, Taipei, Taiwan, Province of China, 9/2/15. https://doi.org/10.1109/INCoS.2015.79
Alzadjali AM, Al-Badi AH, Ali S. An analysis of the security threats and vulnerabilities of cloud computing in Oman. In Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015. Institute of Electrical and Electronics Engineers Inc. 2015. p. 423-428. 7312110 https://doi.org/10.1109/INCoS.2015.79
Alzadjali, Amira M. ; Al-Badi, Ali H. ; Ali, Saqib. / An analysis of the security threats and vulnerabilities of cloud computing in Oman. Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 423-428
@inproceedings{cd30565f47f54c8aafaac600c884c870,
title = "An analysis of the security threats and vulnerabilities of cloud computing in Oman",
abstract = "Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.",
keywords = "cloud computing, frameworks, models, Oman, threats, vulnerabilities",
author = "Alzadjali, {Amira M.} and Al-Badi, {Ali H.} and Saqib Ali",
year = "2015",
month = "10",
day = "28",
doi = "10.1109/INCoS.2015.79",
language = "English",
pages = "423--428",
booktitle = "Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - An analysis of the security threats and vulnerabilities of cloud computing in Oman

AU - Alzadjali, Amira M.

AU - Al-Badi, Ali H.

AU - Ali, Saqib

PY - 2015/10/28

Y1 - 2015/10/28

N2 - Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.

AB - Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.

KW - cloud computing

KW - frameworks

KW - models

KW - Oman

KW - threats

KW - vulnerabilities

UR - http://www.scopus.com/inward/record.url?scp=84959016738&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84959016738&partnerID=8YFLogxK

U2 - 10.1109/INCoS.2015.79

DO - 10.1109/INCoS.2015.79

M3 - Conference contribution

AN - SCOPUS:84959016738

SP - 423

EP - 428

BT - Proceedings - 2015 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -