Advances in Cloud Computing: Security Issues and Challenges in the Cloud

Nooh Bany Muhammad, Mariam Bazzi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In the era of modern technology, the current trend is cloud computing, 'the practice of using the cloud.' Nowadays, most of the people in the world have already utilized the cloud. The cloud is a virtual storage place where people can store, share and run their data thus making it a place to protect. Back when it first started out, the primary two companies that used cloud computing first were Amazon and Google back in 2002-2009. At that time, the cloud's security level was not that sophisticated thus made it vulnerable to attacks. As time passes, people tried solving these issues and have leveled up the defense in the cloud. This paper will discuss cloud security levels from many different aspects to evaluate the secureness of the cloud in general. It will compare the different types of clouds and cloud services. It will also discuss different security risks and challenges across different cloud services.

Original languageEnglish
Title of host publicationProceedings - 2022 5th International Conference on Information and Computer Technologies, ICICT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages110-116
Number of pages7
ISBN (Electronic)9781665469609
DOIs
StatePublished - 2022
Event5th International Conference on Information and Computer Technologies, ICICT 2022 - Virtual, Online, United States
Duration: 4 Mar 20226 Mar 2022

Publication series

NameProceedings - 2022 5th International Conference on Information and Computer Technologies, ICICT 2022

Conference

Conference5th International Conference on Information and Computer Technologies, ICICT 2022
Country/TerritoryUnited States
CityVirtual, Online
Period4/03/226/03/22

Keywords

  • Challenges
  • Cloud
  • Cloud services
  • Risks
  • Security

Fingerprint

Dive into the research topics of 'Advances in Cloud Computing: Security Issues and Challenges in the Cloud'. Together they form a unique fingerprint.

Cite this