Research Output
A survey of cloud computing security overview of attack vectors and defense mechanisms
  Enterprises are more and more moving to the cloud to take advantages of its economic and technological model. However, Privacy and Security issues are often cited as the main obstacle to the adoption of cloud computing for enterprises; hence we need to have a clear understanding of security needs in the cloud in order to achieve solutions. The aim of this paper is twofold: firstly, to distinguish general security issues from cloud-related, and secondly, to provide an overview of attack vectors and defense strategies.

  • Date:

    20 August 2013

  • Publication Status:

    Published

  • ISSN:

    1992-8645

  • Funders:

    Historic Funder (pre-Worktribe)

Citation

麻豆社区

Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330

Authors

Keywords

Attack, Cloud computing, Defense, Security, Threat, Vulnerability

Monthly Views:

Available Documents