A Survey of Security Challenges and Solution in Cloud Computing Environments
Keywords:
Cloud computing, Security, Threats, Security measuresAbstract
Cloud computing has become a fundamental part of contemporary IT infrastructure, providing exceptional adaptability, expandability, and cost-effectiveness. Despite its many benefits, cloud computing also presents several security problems that enterprises must address in order to protect their data and applications. This study offers a thorough examination of the primary security obstacles encountered by firms that operate in cloud computing environments. These problems include a wide range of issues, including data breaches, identity management, compliance concerns, and insider threats. By using the most recent research and industry standards, we investigate possible measures to reduce these threats and improve the security of cloud-based systems. This study seeks to provide companies with the required information and tools to adequately safeguard their assets in the cloud by analyzing both the risks and defensive tactics. By gaining a more profound comprehension of cloud security concerns and implementing strong security measures, enterprises may effectively use the capabilities of cloud computing while reducing the potential hazards involved.
References
U. A. Butt, R. Amin, M. Mehmood, H. Aldabbas, M. T. Alharbi, and N. Albaqami, “Cloud Security Threats and Solutions: A Survey,” Wireless Personal Communications, vol. 128, no. 1. Springer Science and Business Media LLC, pp. 387–413, Sep. 19, 2022. doi: 10.1007/s11277-022-09960-z.
Hussain Akbar, Muhammad Zubair, and Muhammad Shairoze Malik, “The Security Issues and challenges in Cloud Computing,” International Journal for Electronic Crime Investigation, vol. 7, no. 1. Lahore Garrison University, pp. 13–32, Mar. 03, 2023. doi: 10.54692/ijeci.2023.0701125.
M. Chauhan and S. Shiaeles, “An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions,” Network, vol. 3, no. 3. MDPI AG, pp. 422–450, Sep. 12, 2023. doi: 10.3390/network3030018.
M. Alam, M. Shahid, and S. Mustajab, “Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions,” The Journal of Supercomputing. Springer Science and Business Media LLC, Jan. 27, 2024. doi: 10.1007/s11227-023-05873-1.
K. S. Gill, A. Sharma, and S. Saxena, “A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities,” Archives of Computational Methods in Engineering. Springer Science and Business Media LLC, Apr. 01, 2024. doi: 10.1007/s11831-024-10095-6.
Guo, Yunyong, Sudhakar Ganti, and Yi Wu. "Enhancing Energy Efficiency in Telehealth Internet of Things Systems Through Fog and Cloud Computing Integration: Simulation Study." JMIR Biomedical Engineering 9, no. 1 (2024): e50175.
Tai, Kuang-Yen, Frank Yeong-Sung Lin, and Chiu-Han Hsiao. "An Integrated Optimization-Based Algorithm for Energy Efficiency and Resource Allocation in Heterogeneous Cloud Computing Centers." Ieee Access (2023).
Rajagopal, Shinu M., M. Supriya, and Rajkumar Buyya. "FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge-Fog-Cloud computing environments." Internet of Things (2023): 100784.
K. R. Sajay, S. S. Babu, and Y. Vijayalakshmi, “Enhancing the security of cloud data using hybrid encryption algorithm,” Journal of Ambient Intelligence and Humanized Computing. Springer Science and Business Media LLC, Jul. 20, 2019. doi: 10.1007/s12652-019-01403-1.
A. Sanghi, S. Chaudhary, and M. Dave, “Enhance the Data Security in Cloud Computing by Text Steganography,” Lecture Notes in Networks and Systems. Springer Singapore, pp. 241–248, Dec. 31, 2017. doi: 10.1007/978-981-10-6916-1_22.
F. Thabit, S. Alhomdy, and S. Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions,” International Journal of Intelligent Networks, vol. 2. Elsevier BV, pp. 18–33, 2021. doi: 10.1016/j.ijin.2021.03.001.
H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” The Journal of Supercomputing, vol. 76, no. 12. Springer Science and Business Media LLC, pp. 9493–9532, Feb. 28, 2020. doi: 10.1007/s11227-020-03213-1.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Applied Optics
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The CC Attribution-NonCommercial 4.0 License allows sharing and adapting the work, provided the creator is credited and the work is not used commercially. Modifications must be indicated, and derivative works under the same license are allowed.