Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/5782
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumarasinghe, S. G. M. U. | - |
dc.contributor.author | Shafana, M. S. | - |
dc.contributor.author | Ahamed Sabani, M. J. | - |
dc.date.accessioned | 2021-10-04T08:04:05Z | - |
dc.date.available | 2021-10-04T08:04:05Z | - |
dc.date.issued | 2021-07-27 | - |
dc.identifier.citation | 1st International Conference on Science and Technology 2021 on “Technology - based research and innovation for empowerment and sustainability ”. 07th July 2021. South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. pp. 184-191 | en_US |
dc.identifier.isbn | 978-624-5736-17-1 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/5782 | - |
dc.description.abstract | Companies around the world are speedy in using the cloud to revolutionize their digital transformation initiatives. Cloud Computing enables companies to outsource the entire Information Technology process to stay focused on their core business to improve their productivity and creativity in providing clients with services. It allows companies to reduce the high cost of IT infrastructure without losing attention to customer needs. Although the cloud provides a lot of benefits that attract organizations, data security is one of few things which hold back companies from adopting cloud computing solutions. Cloud infrastructure could be complicated, and where complexity and security issues definitely exist. There exist unique cloud computing security issues in a cloud computing infrastructure. Data are stored in the cloud and accessed through the internet via a third-party provider. This means that there is limited visibility and control over the data, which is not a thing to be ignored. There are many other security threats to cloud computing vulnerabilities that cannot be ignored. This paper is going to describe some of the security threats on cloud computing vulnerabilities and will provide a prototypical model to adopt as a solution to overcome the major vulnerabilities. The goal is to convey the proper information to the users (organizations) who are thinking of deploying clouds for their organizations. This paper will help them to be conscious about opting for a proper cloud service provider and will help them in taking precautions to avoid the security issues. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Faculty of Technology, South Eastern University of Sri Lanka, University Park, Oluvil. | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Threats | en_US |
dc.subject | Security model | en_US |
dc.subject | Vulnerabilities | en_US |
dc.subject | CSP | en_US |
dc.subject | Cloud service provider | en_US |
dc.title | A prototypical adoption security model for major vulnerabilities in cloud computing | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1st International Conference on Science and Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
24 P_ICST2021 Final v11_win_Done_sec_p184-191.pdf | 445.52 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.