Cloud Computing: Securing without Losing Control

Main Article Content

Mubarak S. Almutairi


Computing virtualization is the key technology in cloud computing as it can reduce the investment in the hardware component drastically. The present research work carefully analyse some of the major security threats to the cloud services based on the security threat analysis produced by Cloud Security Alliance (CSA). The physical network components are not necessarily located on the same geographical area but yet are doing the necessary processing and storage. As such, “cloud computing” will be the driving force behind most of today's promising computing technologies. Security will be always an issue which needs to be addresses at two different levels: front-end and back-end. In a nutshell, cloud computing is hugely beneficial for the enterprise and while still evolving, will be around for the long-term. It is crucially important for those enterprises which will adopt the cloud computing model to put long-term security strategy in place. Knowledge of cloud architecture, technology, process, services, and deployment models is vital in specifying security models and identifying security concerns in cloud computing. As the providers and end users increase, standardization and security techniques will play an important role in helping organizations to reduce risks involved. This survey also illustrates the view of cloud providers’ actions and assessment of the cloud-computing services provided by them to the IT users.

Cloud computing, securing, losing control, computing model, hardware

Article Details

How to Cite
Almutairi, M. S. (2019). Cloud Computing: Securing without Losing Control. Journal of Advances in Mathematics and Computer Science, 31(2), 1-9.
Review Article