Research Article
Cloud Computing: Potential Risks and Security Approaches
324 downloads
@INPROCEEDINGS{10.1007/978-3-319-66742-3_7, author={Hassen Ben Rebah and Hatem Ben Sta}, title={Cloud Computing: Potential Risks and Security Approaches}, proceedings={e-Infrastructure and e-Services for Developing Countries. 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedings}, proceedings_a={AFRICOMM}, year={2017}, month={10}, keywords={Cloud computing Potential risks Counter-measure Threat}, doi={10.1007/978-3-319-66742-3_7} }
- Hassen Ben Rebah
Hatem Ben Sta
Year: 2017
Cloud Computing: Potential Risks and Security Approaches
AFRICOMM
Springer
DOI: 10.1007/978-3-319-66742-3_7
Abstract
Cloud Computing is a new technology, widely used in different areas, allowing easy and on-demand access through the internet to a shared set of configurable computing resources. The adoption of this new technology within companies is restricted by security constraints. In this paper, we present the most significant risks that could affect organizations intending to deploy Cloud technology and security measures to be in place to reduce the impact of risks based on a literature review.
Copyright © 2016–2024 ICST