A Survey of Security Challenges and Solution in Cloud Computing Environments

Authors

  • Aryan Arya M. Tech Student, Dronacharya College of Engineering, Gurugram University
  • Dr. Ashima Mehta Head of Department, CSE Department, Dronacharya College of Engineering, Gurugram University

Keywords:

Cloud computing, Security, Threats, Security measures

Abstract

Cloud computing has become a fundamental part of contemporary IT infrastructure, providing exceptional adaptability, expandability, and cost-effectiveness. Despite its many benefits, cloud computing also presents several security problems that enterprises must address in order to protect their data and applications. This study offers a thorough examination of the primary security obstacles encountered by firms that operate in cloud computing environments. These problems include a wide range of issues, including data breaches, identity management, compliance concerns, and insider threats. By using the most recent research and industry standards, we investigate possible measures to reduce these threats and improve the security of cloud-based systems. This study seeks to provide companies with the required information and tools to adequately safeguard their assets in the cloud by analyzing both the risks and defensive tactics. By gaining a more profound comprehension of cloud security concerns and implementing strong security measures, enterprises may effectively use the capabilities of cloud computing while reducing the potential hazards involved.

References

U. A. Butt, R. Amin, M. Mehmood, H. Aldabbas, M. T. Alharbi, and N. Albaqami, “Cloud Security Threats and Solutions: A Survey,” Wireless Personal Communications, vol. 128, no. 1. Springer Science and Business Media LLC, pp. 387–413, Sep. 19, 2022. doi: 10.1007/s11277-022-09960-z.

Hussain Akbar, Muhammad Zubair, and Muhammad Shairoze Malik, “The Security Issues and challenges in Cloud Computing,” International Journal for Electronic Crime Investigation, vol. 7, no. 1. Lahore Garrison University, pp. 13–32, Mar. 03, 2023. doi: 10.54692/ijeci.2023.0701125.

M. Chauhan and S. Shiaeles, “An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions,” Network, vol. 3, no. 3. MDPI AG, pp. 422–450, Sep. 12, 2023. doi: 10.3390/network3030018.

M. Alam, M. Shahid, and S. Mustajab, “Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions,” The Journal of Supercomputing. Springer Science and Business Media LLC, Jan. 27, 2024. doi: 10.1007/s11227-023-05873-1.

K. S. Gill, A. Sharma, and S. Saxena, “A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities,” Archives of Computational Methods in Engineering. Springer Science and Business Media LLC, Apr. 01, 2024. doi: 10.1007/s11831-024-10095-6.

Guo, Yunyong, Sudhakar Ganti, and Yi Wu. "Enhancing Energy Efficiency in Telehealth Internet of Things Systems Through Fog and Cloud Computing Integration: Simulation Study." JMIR Biomedical Engineering 9, no. 1 (2024): e50175.

Tai, Kuang-Yen, Frank Yeong-Sung Lin, and Chiu-Han Hsiao. "An Integrated Optimization-Based Algorithm for Energy Efficiency and Resource Allocation in Heterogeneous Cloud Computing Centers." Ieee Access (2023).

Rajagopal, Shinu M., M. Supriya, and Rajkumar Buyya. "FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge-Fog-Cloud computing environments." Internet of Things (2023): 100784.

K. R. Sajay, S. S. Babu, and Y. Vijayalakshmi, “Enhancing the security of cloud data using hybrid encryption algorithm,” Journal of Ambient Intelligence and Humanized Computing. Springer Science and Business Media LLC, Jul. 20, 2019. doi: 10.1007/s12652-019-01403-1.

A. Sanghi, S. Chaudhary, and M. Dave, “Enhance the Data Security in Cloud Computing by Text Steganography,” Lecture Notes in Networks and Systems. Springer Singapore, pp. 241–248, Dec. 31, 2017. doi: 10.1007/978-981-10-6916-1_22.

F. Thabit, S. Alhomdy, and S. Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions,” International Journal of Intelligent Networks, vol. 2. Elsevier BV, pp. 18–33, 2021. doi: 10.1016/j.ijin.2021.03.001.

H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” The Journal of Supercomputing, vol. 76, no. 12. Springer Science and Business Media LLC, pp. 9493–9532, Feb. 28, 2020. doi: 10.1007/s11227-020-03213-1.

Published

14-03-2024

How to Cite

Aryan Arya, & Dr. Ashima Mehta. (2024). A Survey of Security Challenges and Solution in Cloud Computing Environments. Journal of Applied Optics, 364–375. Retrieved from https://appliedopticsjournal.net/index.php/JAO/article/view/129

Issue

Section

Conference Paper

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.