Authors :
Rajesh Kumar
Volume/Issue :
Volume 9 - 2024, Issue 11 - November
Google Scholar :
https://tinyurl.com/2rzy5wfe
Scribd :
https://tinyurl.com/28hrzfan
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24NOV057
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The unparalleled scalability and flexibility of
cloud computing have fundamentally transformed how
businesses manage and store data (Hashizume, 2013).
However, security risks and hazards are becoming more
and more of a concern as businesses use cloud services.
This paper provides an in-depth analysis of the various
security concerns that cloud computing infrastructures
have to address (Hashizume, 2013). By examining common
threats like data breaches, unauthorized access, unsecured
interfaces, and shared technological vulnerabilities, this
study aims to illustrate the critical importance of proactive
security measures in protecting sensitive data (Shaikh,
2011). Through an analysis of network security strategies,
identity and access management, encryption technologies,
and incident response planning, this paper offers insights
into best practices for managing security risks in the cloud
(Shaikh, 2011). This paper provides businesses with a road
map for enhancing their cloud security.
Keywords :
Cloud Computing, Security Risks, Threats, Data Breaches, Unauthorized Access, Shared Technology Vulnerabilities, Cyber Threats, And Encryption Protocols.
References :
- Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4, 1-13.
- Shaikh, F. B., & Haider, S. (2011, December). Security threats in cloud computing. In 2011 International conference for Internet technology and secured transactions (pp. 214-219). IEEE.
- Zhang, X., Wuwong, N., Li, H., & Zhang, X. (2010, June). Information security risk management framework for cloud computing environments. In 2010 10th IEEE international conference on computer and information technology (pp. 1328-1334. IEEE.
- Khan, A. U., Oriol, M., Kiran, M., Jiang, M., & Djemame, K. (2012, December). Security risks and their management in cloud computing. In 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings (pp. 121-128).
- Ashraf, I. (2014). An overview of service models of cloud computing. International Journal of Multidisciplinary and Current Research, 2(1), 779-783. Ieee.
- Alshammari, A., Alhaidari, S., Alharbi, A., & Zohdy, M. (2017, June). Security threats and challenges in cloud computing. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 46-51). IEEE.
- Akinrolabu, O., Nurse, J. R., Martin, A., & New, S. (2019). Cyber risk assessment in cloud provider environments: Current models and future needs. Computers & Security, 87, 101600.
- Singh, A. K., & Sharma, S. D. (2019). High Performance Computing (HPC) Data Center for Information as a Service (IaaS) Security Checklist: Cloud Data Governance. Webology, 16(2).
- Saed, K. A., Aziz, N., Ramadhani, A. W., & Hassan, N. H. (2018, August). Data governance cloud security assessment at data center. In 2018 4th International Conference on Computer and Information Sciences (ICCOINS) (pp. 1-4). IEEE.
- Almutairi, A., Sarfraz, M. I., & Ghafoor, A. (2015). Risk-aware management of virtual resources in access-controlled service-oriented cloud datacenters. IEEE Transactions on Cloud Computing, 6(1), 168-181.
- Rath, M., Satpathy, J., & Oreku, G. S. (2021). Artificial intelligence and machine learning applications in cloud computing and Internet of Things. In Artificial intelligence to solve pervasive internet of things issues (pp. 103-123). Academic Press.
- Yimam, D., & Fernandez, E. B. (2016). A survey of compliance issues in cloud computing. Journal of Internet Services and Applications, 7, 1-12.
- Ahn, G.-J., Oprea, A., & Safavi–Naini, R. (2014, November 7). Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security. https://doi.org/10.1145/2664168
- Thiam, L. S., Dargahi, T., & Dehghantanha, A. (2019). Bibliometric Analysis on the Rise of Cloud Security (pp. 329–344). springer. https://doi.org/10.1007/978-3-030-10543-3_14
- Stackscale. (2024, February 14). Main cloud service models: IaaS, PaaS and SaaS. Stackscale. https://www.stackscale.com/blog/cloud-service-models/
The unparalleled scalability and flexibility of
cloud computing have fundamentally transformed how
businesses manage and store data (Hashizume, 2013).
However, security risks and hazards are becoming more
and more of a concern as businesses use cloud services.
This paper provides an in-depth analysis of the various
security concerns that cloud computing infrastructures
have to address (Hashizume, 2013). By examining common
threats like data breaches, unauthorized access, unsecured
interfaces, and shared technological vulnerabilities, this
study aims to illustrate the critical importance of proactive
security measures in protecting sensitive data (Shaikh,
2011). Through an analysis of network security strategies,
identity and access management, encryption technologies,
and incident response planning, this paper offers insights
into best practices for managing security risks in the cloud
(Shaikh, 2011). This paper provides businesses with a road
map for enhancing their cloud security.
Keywords :
Cloud Computing, Security Risks, Threats, Data Breaches, Unauthorized Access, Shared Technology Vulnerabilities, Cyber Threats, And Encryption Protocols.