Loading…

A Study of Top Security Threats Facing Companies Using Cloud Computing Services

Cloud computing delivers different computing services such as computational platform, computational power, servers, database, storage, software applications and networking over the internet to offer quicker innovation and flexible resources. Cloud computing service providers have brought the e-comme...

Full description

Saved in:
Bibliographic Details
Published in:Webology 2022-01, Vol.19 (2), p.1899-1917
Main Authors: Ahmed, Mukhtar, Latif, Ajmal, Jafari, Ali Shiraz
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud computing delivers different computing services such as computational platform, computational power, servers, database, storage, software applications and networking over the internet to offer quicker innovation and flexible resources. Cloud computing service providers have brought the e-commerce or business supporting technologies that is attracting the different companies all over the world. Despite that the cloud computing has been deployed and utilizing around of the globe, but still the security threat is a big deal for the cloud computing services. Companies using cloud computing services experiencing different security threats or incidents, in which confidential information, sensitive documents, protected data is seen where, transmitted, copied, stolen and lost by attackers all over the world. In this paper we review and survey the top security concerns related to the cloud computing. We discuss here, i) identifying the top security threats, the companies are facing while using cloud computing services, and ii) the most important countermeasures found in the literature to prevent the security threats of cloud computing. In the cloud computing situation, countermeasures are not likely to be affective 100pc, due to persistent variation from the attackers. A slight negligible security vulnerability and threats provide the opportunity to the attackers to access the sensitive information of the company. These solutions include the top security techniques for the existing literature and the best countermeasures that must followed by the cloud computing users.
ISSN:1735-188X