Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq

View through CrossRef
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing. In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq. Consequently, many countermeasures are proposed. Descriptive research methodology is adopted in this research. The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.
Title: Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq
Description:
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere.
In addition, many other features and services can be offered to customers.
However, cloud computing still suffers many threats which may cause vulnerabilities.
Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality.
Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing.
In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq.
Consequently, many countermeasures are proposed.
Descriptive research methodology is adopted in this research.
The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.

Related Results

Resource Allocation in Cloud Computing Environment using AHP Technique
Resource Allocation in Cloud Computing Environment using AHP Technique
Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and...
Iraq’s archive fever
Iraq’s archive fever
This article contemplates Iraq’s archive fever, a repositioning of Freud’s death-drive as prescribed by Jacques Derrida, to contextualize the feverish obsession with Iraq’s archive...
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
As the number of context-aware and unique data extracting and computing has grown leaps and bounds, paving way to their application in many platforms, Internet of Things (IoT) has ...
L'éducation des enfants venus de pays étrangers en Hollande
L'éducation des enfants venus de pays étrangers en Hollande
The adoption-organizations pleaded for a reform of the adoption-legislation in the Netherlands in 1956. It was hardly a concern of the politics. The number of Dutch children ...
The North Iraq Dataset (NIDS) files: Northern Iraq under Bathist rule, 1968‐911
The North Iraq Dataset (NIDS) files: Northern Iraq under Bathist rule, 1968‐911
The first archival collection from Saddam Hussein’s regime to receive the attention of researchers in the early 1990s was the large number of documents secured by Iraqi Kurdish reb...
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary dupli...
Contemporary Terrorist Challenges and Threats in Europe
Contemporary Terrorist Challenges and Threats in Europe
This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a un...
VOTE: Verifiable Auditing for Outsourced Database with Token Enforced Cloud Storage
VOTE: Verifiable Auditing for Outsourced Database with Token Enforced Cloud Storage
Database deploying is one of the remarkable utilities in cloud computing where the Information Proprietor (IP) assigns the database administration to the Cloud Service Provider (CS...

Back to Top