Overview of Attacks on Cloud Computing

Cloud computing is currently one the most hyped IT innovations. Most IT companies announce to plan or (suddenly) already have IT products according to the cloud computing paradigm. Though cloud computing itself is still not yet mature enough, it is already evident that it's most critical flaw according to public consent is security. In the nearest future, the authors can expect to see a lot of new security exploitation events around cloud computing providers and users, which will shape the cloud computing security research directions for the next decade. Hence, they have seen a rapid evolution of a cloud computing security discipline, with ongoing efforts to cope with the idiosyncratic requirements and capabilities regarding privacy and security issues that this new paradigm raises.

Provided by: International Journal of Engineering and Innovative Technology (IJEIT) Topic: Cloud Date Added: Apr 2012 Format: PDF

Find By Topic