Global Journal on
Technology
Issue 8 (2015) 15-28
Selected Paper of 2nd Global Conference on Computer Science, Software, Networks And Engineering, (COMENG-2014)
06 - 08 November 2014, Efes “üƌŵeli Hotel & CoŶǀeŶtioŶ CeŶteƌ – İzŵiƌ, Kuşadası, Turkey
Cloud Computing Security: A Survey
Muhammad Roman*, Institute of Information Technology, Kohat University of Science and Technology, Kohat.
Shafiullah Khan, Institute of Information Technology, Kohat University of Science and Technology, Kohat.
Suggested Citation:
Roman, M. & Khan, S. (2015). Cloud Computing Security: A Survey, Global Journal on Technology [Online]. 08, pp
15-28. Available from: http://awer-center.org/gjt/
Received June 20, 2014; revised July 10, 2014; accepted October 11, 2014.
Selection and peer review under responsibility of AssoĐ. Pƌof. Dƌ. Özcan Asilkan.
©ϮϬϭϱ SPROC - Academic World Education & Research Center. All rights reserved.
Abstract
Cloud computing brings new possibilities for individuals and firms to utilize computing as a utility. It utilizes
ĐoŵputiŶg poǁeƌ iƌƌeleǀaŶt of useƌ’s loĐatioŶ aŶd deǀiĐes. Thus it has ďeĐoŵe ŵoƌe deŵaŶdiŶg due to its
performance, high computing power, cheapness, elasticity, accessibility, scalability and availability. Cloud
computing offers ubiquitous operation with different security challenges. In this paper we discuss security
challenges and vulnerabilities as well as limitations of current security modules. This paper will serve as a
baseline guide for new researchers in this area.
Keywords: cloud computing security, infrastructure-as-a-service(IAAS), Platform-as-a-Service(PAAS), Software-
as-a-Service(SAAS), private cloud, public cloud, hybrid cloud, trust, vulnerabilities .
* ADDRESS FOR CORRESPONDENCE: Muhammad Roman, Institute of Information Technology, Kohat University of Science
and Technology, Kohat. E-mail address: roman.kht@gmail.com