TY - JOUR
T1 - Cyber security threats, challenges and defence mechanisms in cloud computing
AU - Aljumah, Abdullah
AU - Ahanger, Tariq Ahamed
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2020.
PY - 2020/4/22
Y1 - 2020/4/22
N2 - With the advent of computers and their widespread use, cloud computing has been identified as one of the major emerging components of computer technology. The benefits of cloud computing, in the form of processing power and computing resources connected via the internet, have not only bolstered business and personal operations of users but have also led to severe security and privacy threats that require adaptation into cloud computing systems. In light of this, the present study explores the various threats to cloud computing, in addition to outlining defence mechanisms against these threats. It was found that there is a major threat concerning data breaches because of the lack of management understanding of the use of cloud computing services and their defence mechanisms. Furthermore, there can be an abuse of cloud computing services that, in turn, affect not only sensitive data pertaining to the organisation but also the personal identity and information of the user.
AB - With the advent of computers and their widespread use, cloud computing has been identified as one of the major emerging components of computer technology. The benefits of cloud computing, in the form of processing power and computing resources connected via the internet, have not only bolstered business and personal operations of users but have also led to severe security and privacy threats that require adaptation into cloud computing systems. In light of this, the present study explores the various threats to cloud computing, in addition to outlining defence mechanisms against these threats. It was found that there is a major threat concerning data breaches because of the lack of management understanding of the use of cloud computing services and their defence mechanisms. Furthermore, there can be an abuse of cloud computing services that, in turn, affect not only sensitive data pertaining to the organisation but also the personal identity and information of the user.
UR - http://www.scopus.com/inward/record.url?scp=85083455960&partnerID=8YFLogxK
U2 - 10.1049/iet-com.2019.0040
DO - 10.1049/iet-com.2019.0040
M3 - Article
AN - SCOPUS:85083455960
SN - 1751-8628
VL - 14
SP - 1185
EP - 1191
JO - IET Communications
JF - IET Communications
IS - 7
ER -