University of Hertfordshire

By the same authors

Cloud Computing Storms

Research output: Contribution to journalArticlepeer-review

Documents

View graph of relations
Original languageEnglish
Pages (from-to)47-54
JournalInternational Journal of Intelligent Computing Research
Volume1
Issue2
DOIs
Publication statusPublished - Jun 2010
Externally publishedYes

Abstract

Cloud Computing (CC) is seeing many organisations experiencing the ‘credit crunch’, embracing the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME’s who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline these loopholes and attempt to describe the perfect crime conducted within a cloud environment.

ID: 10607348