1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jait@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

An Investigation of the Most Critical Security Vulnerabilities in Cloud Computing in Saudi Arabia

Amani M. Ghazzawi 1, Fatimah M. Alqahtani 1, Fahd S. Alotaibi 1, and Sjaak Laan 2
1. Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
2. Principal IT Architect, CGI

Abstract— Cloud computing is "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources can be rapidly provisioned and released with minimal management effort or service provider interaction"[1]. While cloud computing has several benefits, some organizations do not use it because of security concerns. This study was conducted to explore threats, vulnerabilities, and security risks in cloud computing, and present some solutions to those concerns. This paper has three main objectives. First, identifying the reality of cloud computing security generally. Second, covering the most critical security vulnerabilities, threats, and issues in cloud computing as well as suggestions to mitigate them. Third, clarifying security countermeasures used in Saudi Arabia in medical, commercial, and academic fields, and commercial fields. Logical and administrative data security, service level agreements, data leakage, customer monitoring, and the existence of loopholes are the major security issues in the cloud computing. Using private cloud, multiple frames of data storage, improving content security, data integrity, and service level agreement, encryption mechanisms, and access control services are some solutions to mitigate cloud computing security concerns.

Cite: Amani M. Ghazzawi, Fatimah M. Alqahtani, Fahd S. Alotaibi, and Sjaak Laan, "An Investigation of the Most Critical Security Vulnerabilities in Cloud Computing in Saudi Arabia," Vol. 8, No. 3, pp. 165-171, August, 2017. doi: 10.12720/jait.8.3.165-171

Copyright © 2013-2016 Journal of Advances in Information Technology, All Rights Reserved
E-mail: jait@etpub.com