e-Infrastructure and e-Services for Developing Countries. 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedings

Research Article

Cloud Computing: Potential Risks and Security Approaches

Download
254 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-66742-3_7,
        author={Hassen Ben Rebah and Hatem Ben Sta},
        title={Cloud Computing: Potential Risks and Security Approaches},
        proceedings={e-Infrastructure and e-Services for Developing Countries. 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedings},
        proceedings_a={AFRICOMM},
        year={2017},
        month={10},
        keywords={Cloud computing Potential risks Counter-measure Threat},
        doi={10.1007/978-3-319-66742-3_7}
    }
    
  • Hassen Ben Rebah
    Hatem Ben Sta
    Year: 2017
    Cloud Computing: Potential Risks and Security Approaches
    AFRICOMM
    Springer
    DOI: 10.1007/978-3-319-66742-3_7
Hassen Ben Rebah1,*, Hatem Ben Sta,*
  • 1: Higher Institute of Technological Studies
*Contact email: ben_rebah_h@yahoo.fr, hatem.bensta@gmail.com

Abstract

Cloud Computing is a new technology, widely used in different areas, allowing easy and on-demand access through the internet to a shared set of configurable computing resources. The adoption of this new technology within companies is restricted by security constraints. In this paper, we present the most significant risks that could affect organizations intending to deploy Cloud technology and security measures to be in place to reduce the impact of risks based on a literature review.