Security Challenges for Cloud Computing Development Framework in Saudi Arabia

Security Challenges for Cloud Computing Development Framework in Saudi Arabia

Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: © 2015 |Pages: 16
DOI: 10.4018/978-1-4666-8387-7.ch013
OnDemand PDF Download:
No Current Special Offers


In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.
Chapter Preview

2. Cloud Computing Models

Various efforts were made in order to find an appropriate definition for cloud computing.

Key Terms in this Chapter

Access Control: Set of security measures to determine who should have access to the system or part of the system. It is a counter measure against unauthorized access.

Computer Fraud: Any act using computer or network resources and services to defraud people, companies, or government agencies of money, revenue, or Internet access.

Network Security: Security mechanism dealing with protection of the networking system as a whole and sustain its capability to provide connectivity between the communicating entities.

Cybersecurity: The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Malicious Insider: This is an employee, contractor or sub-contractor with access to whole or part of the computer systems who may be disgruntled or feel obligated to steal intellectual property.

Traffic Hijacking: Intentional redirection of internet traffic. Attackers take advantage of traffic routing announcements between networks using Border Gateway Protocol being trust-based.

Authentication: The process of determining whether someone or something is, in fact, who or what it is declared to be before accessing or using a computer system.

Complete Chapter List

Search this Book: