Skip to main content

Research Repository

Advanced Search

A survey of cloud computing security overview of attack vectors and defense mechanisms

Lemoudden, Mouad; Ben Bouazza, N.; El Ouahidi, B.; Bourget, D.

Authors

N. Ben Bouazza

B. El Ouahidi

D. Bourget



Abstract

Enterprises are more and more moving to the cloud to take advantages of its economic and technological model. However, Privacy and Security issues are often cited as the main obstacle to the adoption of cloud computing for enterprises; hence we need to have a clear understanding of security needs in the cloud in order to achieve solutions. The aim of this paper is twofold: firstly, to distinguish general security issues from cloud-related, and secondly, to provide an overview of attack vectors and defense strategies.

Citation

Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330

Journal Article Type Article
Online Publication Date Aug 20, 2013
Publication Date 2013-08
Deposit Date Feb 28, 2023
Journal Journal of Theoretical and Applied Information Technology
Print ISSN 1992-8645
Peer Reviewed Peer Reviewed
Volume 54
Issue 2
Pages 325-330
Keywords Attack, Cloud computing, Defense, Security, Threat, Vulnerability
Publisher URL http://www.jatit.org/volumes/Vol54No2/15Vol54No2.pdf