Security Challenges for Cloud Computing Development Framework in Saudi Arabia

Security Challenges for Cloud Computing Development Framework in Saudi Arabia

Lawan A. Mohammed, Kashif Munir
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch026
Cite Chapter Cite Chapter

MLA

Mohammed, Lawan A., and Kashif Munir. "Security Challenges for Cloud Computing Development Framework in Saudi Arabia." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 485-500. https://doi.org/10.4018/978-1-5225-5634-3.ch026

APA

Mohammed, L. A. & Munir, K. (2018). Security Challenges for Cloud Computing Development Framework in Saudi Arabia. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 485-500). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch026

Chicago

Mohammed, Lawan A., and Kashif Munir. "Security Challenges for Cloud Computing Development Framework in Saudi Arabia." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 485-500. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch026

Export Reference

Mendeley
Favorite

Abstract

In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.