Biggs, Stephen and VIDALIS, Stilianos (2010) Cloud Computing Storms. International Journal of Intelligent Computing Research, 1 (1). pp. 61-68. ISSN 2042-4655
ICITST 2009 Paper Final Amended - Journal Draft.doc
Download (78kB)
Abstract or description
Cloud Computing (CC) is seeing many organisations experiencing the ‘credit crunch’, embracing the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME’s who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline these loopholes and attempt to describe the perfect crime conducted within a cloud environment.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | cloud computing, cloud forensics, digital forensic investigations |
Faculty: | Previous Faculty of Computing, Engineering and Sciences > Computing |
Depositing User: | Stilianos VIDALIS |
Date Deposited: | 19 Apr 2013 13:34 |
Last Modified: | 24 Feb 2023 13:37 |
Related URLs: | |
URI: | https://eprints.staffs.ac.uk/id/eprint/785 |