Cloud Security Challenges
EOI: 10.11242/viva-tech.01.05.001
Citation
Prof. Pradnya Mhatre1, Pratik Ahirrao2, Sumeet Bole3 ,"Cloud Security Challenges", VIVA-IJRI Volume 1, Issue 7, Article 1, pp. 1-7, 2024. Published by Master of Computer Application Department, VIVA Institute of Technology, Virar, India.
Abstract
Cloud computing has come a vital tool for businesses and individualities to store and access data and operations. Still, with the adding reliance on Cloud services comes an increased threat of security breaches and data loss This paper delves into security challenges within cloud computing, including issues like data breaches, unauthorized access, and a lack of transparency. Additionally, the paper examines potential solutions to these concerns, such as implementing robust authentication protocols, encryption, and conducting regular security assessments. It emphasizes the significance for organizations to be vigilant about these security risks and adopt necessary measures to safeguard their data and systems in the cloud.
Keywords
Cloud technology, Unauthorized data access, Safeguarding information, Auditing security measures, Security challenges.
References
- [1] Q. Wang, N. Li, K. Ren, and W. Lou, "Heading towards secure and reliable storage services in cloud computing.," IEEE Transactions on Services Computing, 12(2), 2019, pp. 266-279.
- [2] A. Al-Fuqaha, M. Guizani, M. Mohammady, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications”, IEEE Communications Surveys & Tutorials, 17(4), 2015, pp. 2347-2376.
- [3] J. Garcia-Alfaro, E. de Lara, and P. Veríssimo, "Cloud computing and data protection: A survey of legal and technical issues," IEEE Communications Surveys & Tutorials, 20(3), 2018, pp. 1778-1819.
- [4] G. Wang, J. Zhang, and J. Li, "A survey on cloud service models," IEEE Access, 8, 2020, pp. 78532-78546.
- [5] P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, 53(6), 2011, pp. 50-53.
- [6] G. Wei, Y. Chen, and Y. Liu, "A survey on cloud service models and architectures," IEEE Communications Surveys & Tutorials, 19(3), 2017, pp. 1617-1644. [7] A. Beloglazov, R. Buyya, and J. Abawajy, "Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers," Concurrency and Computation: Practice and Experience, 25(13), 2013, pp. 1397-1420.
- [8] S. Kshetri, "Cloud computing and information security,"Journal of Information Privacy and Security, 9(3), 2013, pp. 131-149.
- [9] N. L. B. Pouwelse, P. J. A. Buhr, and M. J. G. Van Sinderen, "Cloud computing security challenges," Journal of Cloud Computing: Advances, Systems and Applications, 2(1), 2013, pp. 1-20.
- [10] A. Alharbi, A. Alqahtani, and K. Alkhalaf, "A survey of cloud computing security issues," Journal of Network and Computer Applications, 36(6), 2013, pp. 1417-1432.
- [11] S. S. Al-Saggaf, "Cloud Security Challenges”: A survey," Journal of Information and Communication Technologies, 5(2), 2015, pp. 1-15.
- [12] S. R. H. Raza, A. A. Al-Dubai, and T. Ahmed, "A comprehensive survey of security issues in cloud computing," Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11.
- [13] P. Mell, T. Grance, and K. Scarfone, Guidelines on security and privacy in public cloud computing (National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011).
- [14] K. C. C. Chang, "Qualitative research: The field of the field”.
- [15] J. Creswell and V. Plano Clark, Designing and Conducting Mixed Methods Research (Sage, 2011).
- [16] S. K. S. Gupta, "Cloud service providers' security measures," International Journal of Advanced Research in Computer Science and Software Engineering, 3(12), 2013, pp. 1-7.
- [17] M. A. Sookhak, S. Khan, R. Z. Khan, A. Ghani, and M. H. Alam, "Security in cloud computing: Opportunities and challenges," Future Generation Computer Systems, 82, 2018, pp. 29-50.
- [18] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11.
- [19] M. Almorsy, J. Grundy, and A. Ibrahim, "Cloud computing security: A systematic literature review," Future Generation Computer Systems, 79, 2018, pp. 849-861.