Reference Hub6
Cloud Computing Security: Opportunities and Pitfalls

Cloud Computing Security: Opportunities and Pitfalls

Junaid Arshad, Paul Townend, Jie Xu, Wei Jie
Copyright: © 2012 |Volume: 4 |Issue: 1 |Pages: 15
ISSN: 1938-0259|EISSN: 1938-0267|EISBN13: 9781466612310|DOI: 10.4018/jghpc.2012010104
Cite Article Cite Article

MLA

Arshad, Junaid, et al. "Cloud Computing Security: Opportunities and Pitfalls." IJGHPC vol.4, no.1 2012: pp.52-66. http://doi.org/10.4018/jghpc.2012010104

APA

Arshad, J., Townend, P., Xu, J., & Jie, W. (2012). Cloud Computing Security: Opportunities and Pitfalls. International Journal of Grid and High Performance Computing (IJGHPC), 4(1), 52-66. http://doi.org/10.4018/jghpc.2012010104

Chicago

Arshad, Junaid, et al. "Cloud Computing Security: Opportunities and Pitfalls," International Journal of Grid and High Performance Computing (IJGHPC) 4, no.1: 52-66. http://doi.org/10.4018/jghpc.2012010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.