257 Downloads (Pure)

Abstract

Cloud Computing (CC) is seeing many organisations experiencing the ‘credit crunch’, embracing the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME’s who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline these loopholes and attempt to describe the perfect crime conducted within a cloud environment.
Original languageEnglish
Pages (from-to)47-54
JournalInternational Journal of Intelligent Computing Research
Volume1
Issue number2
DOIs
Publication statusPublished - Jun 2010

Fingerprint

Dive into the research topics of 'Cloud Computing Storms'. Together they form a unique fingerprint.

Cite this