Cloud Computing: A Study of Vulnerabilities
Addressing the security concerns of cloud computing
Keywords:
Cloud computing, vulnerabilities, delivery of services, software, analytics, servers, storage, databases, networking, intelligence, innovation, resources, economies of scale, operating costs, infrastructure, business needs, precautions, managers, IT, cloud-based services, information policy, privacy, security, reliability, access, regulation, decision makers, users, potential risks, data, service options, natural language processing, artificial intelligence, office applications, computer hardwareAbstract
Cloud computing is the delivery of different computing services over the internet (‘the cloud’) such as - software, analytics, servers, storage, databases, networking, and intelligence to offer faster innovation, flexible resources, and economies of scale. The amount is typically paid only for cloud services we use, helping lower our operating costs, run infrastructure more efficiently and scale as our business needs change. Affordable, efficient, and scalable, cloud computing is still the best solution for most businesses -- but it can still leave us vulnerable if the proper precautions aren't taken.Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”. Cloud computing services cover a vast range of options now, from the basics of storage, networking, and processing power through to natural language processing and artificial intelligence as well as standard office applications. Pretty much any service that doesn't require you to be physically close to the computer hardware that you are using can now be delivered via the cloud.Published
2018-04-01
How to Cite
[1]
“Cloud Computing: A Study of Vulnerabilities: Addressing the security concerns of cloud computing”, JASRAE, vol. 15, no. 1, pp. 1000–1005, Apr. 2018, Accessed: Jun. 27, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/7757
Issue
Section
Articles
How to Cite
[1]
“Cloud Computing: A Study of Vulnerabilities: Addressing the security concerns of cloud computing”, JASRAE, vol. 15, no. 1, pp. 1000–1005, Apr. 2018, Accessed: Jun. 27, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/7757