Gap Analysis of Security in the Cloud
| dc.contributor.author | Mohamed A. El-dosuky | |
| dc.contributor.author | Afnan Alshahrani | |
| dc.date.accessioned | 2025-06-19T07:31:38Z | |
| dc.date.issued | 2022-10 | |
| dc.description.abstract | Cloud Computing (CC) is defined by National Institute of Standards and Technology (NIST) as : a model for on-demand network-based access to a shared collection of resources, with the least intervention by service providers. CC is a technical term for providing a plethora of Information Technology services to customers via networks. Usually, those services in CC are provided via third parties who own the infrastructures. It offers a practical business model for any organization to utilize Information Technology services without upfront details. However, an organization may not be in a hurry in adopting CC because of security issues. These issues are an active field that needs to be handled in a proper way to avoid attacks and threats for both consumers and service providers. This paper scrutinizes CC attacks and threats with their techniques of mitigation and producing complete list of CC security threats. The paper also scrutinizes CC security gap and focuses on types of service delivery. The paper shows that the proposed framework has three phases. In phase I, committee members take a questionnaire to gain their responses. In phase II, the researchers conduct statistical analysis on responses from committee members. In phase III, simulation tools will implement the proposed CC model. Simulation tools are CloudSim, and Cloud Analyst. The former is a framework for simulating and modeling CC environments that is implemented in Java. | |
| dc.identifier.uri | https://research.arabeast.edu.sa/handle/123456789/250 | |
| dc.language.iso | en | |
| dc.publisher | International Journal of Computer Applications | |
| dc.title | Gap Analysis of Security in the Cloud | |
| dc.type | Article |