A Review of Challenges and Security Risks of Cloud Computing

Authors

  • Hussam Alddin S. Ahmed Faculty of Computer System and Software Engineering, University Malaysia Pahang, Kuantan, Pahang, Malaysia.
  • Mohammed Hasan Ali Faculty of Computer System and Software Engineering, University Malaysia Pahang, Kuantan, Pahang, Malaysia.
  • Laith M. Kadhum Faculty of Computer System and Software Engineering, University Malaysia Pahang, Kuantan, Pahang, Malaysia.
  • Mohamad Fadli Zolkipli Faculty of Computer System and Software Engineering, University Malaysia Pahang, Kuantan, Pahang, Malaysia.
  • Yazan A. Alsariera Faculty of Computer System and Software Engineering, University Malaysia Pahang, Kuantan, Pahang, Malaysia.

Keywords:

Cloud Computing Security, Cloud Computing Risk,

Abstract

Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-demand services. Taking the advantage of low cost derived from the increase in efficiency and performance facilitated by cloud computing, governments and organizations around the globe are motivated to build or migrate to the cloud. However, there are still many technical issues relating to the features of cloud computing and the provision of quality service, leading to a delay in adopting cloud computing. This review paper highlights the security risks and challenges of cloud computing and study the security requirements for cloud computing. The primary aim of this review is to classify the security risks and challenges related to the different forms of cloud computing (SaaS, PaaS and IaaS).

Downloads

Published

2017-03-01

How to Cite

S. Ahmed, H. A., Ali, M. H., M. Kadhum, L., Zolkipli, M. F., & A. Alsariera, Y. (2017). A Review of Challenges and Security Risks of Cloud Computing. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-2), 87–91. Retrieved from https://jtec.utem.edu.my/jtec/article/view/1662

Most read articles by the same author(s)