A REVIEW OVER SECURITY AWARENESS AND CHALLENGES OF CLOUD COMPUTING TECHNOLOGY
Abstract
With the technological advancement in the current era, smart devices have been involved in every sector of human life such as industries, hospitals, institutions, and homes. This massive usage of smart devices has caused an increment in data generation. High-performance computing (HPC) is required to deal with this huge amount of data. Now, it is very costly for small industries and laymen to purchase such types of high-performance computing systems. For this reason, cloud computing is the best cost-effective solution to solve this high-performance computing requirement. In this paper, the authors concentrated on different aspects of cloud computing, a distributed architecture to perform as the centralized server resource on a scalable platform to deliver on-demand computing resources and services. This research paper presented a short overview of cloud computing deployment models, cloud types, cloud services, and the primary security threats and challenges plaguing the cloud computing sector.
References
[2] Wang, L., von Laszewski, G., Younge, A. et al. Cloud Computing: a Perspective Study. New Gener. Comput. 28, 137–146 (2010). https://doi.org/10.1007/s00354-008-0081-5
[3] Mathew, S., Gulia, S., Singh, V. and Dev, V., 2017. A Review Paper on Cloud Computing and Its Security Concerns. RICE, pp.245-250.
[4] Jathanna, R. and Jagli, D., 2017. Cloud computing and security issues. International Journal of Engineering Research and Applications, 7(6), pp.31-38.
[5] Sabir, Sabiyyah. "Security issues in cloud computing and their solutions: a review." International Journal of Advanced Computer Science and Applications 9.11 (2018).
[6] Kumar, Rakesh, and Rinkaj Goyal. "On cloud security requirements, threats, vulnerabilities and countermeasures: A survey." Computer Science Review 33 (2019): 1-48.
[7] Che, J., Duan, Y., Zhang, T. and Fan, J., 2011. Study on the security models and strategies of cloud computing. Procedia Engineering, 23, pp.586-593.
[8] Waqas, M, Kumar, K, Laghari, AA, et al. Botnet attack detection in Internet of Things devices over cloud environment via machine learning. Concurrency Computat Pract Exper. 2022; 34( 4):e6662. doi:10.1002/cpe.6662.
[9] Knight, S., 2020. Strategies to Reduce Small Business Data Security Breaches (Doctoral dissertation, Walden University).
[10] Shackelford, S.J., 2012. Should your firm invest in cyber risk insurance?. Business Horizons, 55(4), pp.349-356.
[11] Al-Issa, Yazan, Mohammad Ashraf Ottom, and Ahmed Tamrawi. "eHealth cloud security challenges: a survey." Journal of healthcare engineering 2019 (2019).
[12] Abdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and privacy in cloud computing: technical review." Future Internet 14.1 (2022): 11.
[13] Bulusu, Santosh, and Kalyan Sudia. "A study on cloud computing security challenges." (2013).
[14] Qadiree, J. and Maqbool, I.M., 2016. Solutions of Cloud Computing Security Issues. International Journal of Computer Science Trends and Technology (IJCST), 4(2), pp.38-42.
[15] SHIRVANI, MIRSAEID HOSSEINI, AMIR MASOUD RAHMANI, AND AMIR SAHAFI. "A SURVEY STUDY ON VIRTUAL MACHINE MIGRATION AND SERVER CONSOLIDATION TECHNIQUES IN DVFS-ENABLED CLOUD DATACENTER: TAXONOMY AND CHALLENGES." JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 32.3 (2020): 267-286.
[16] Gartenr Inc.,"Gartner Says IT Organizations Will Spend More Money on Private Cloud Computing Investments Than on Offerings From Public Cloud Providers Through 2012" ,http://www.gartner.com/it/page.jsp?id=1239813, December 1, 2009.
[17] Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.
[18] Shahzad, F., 2014. State-of-the-art survey on cloud computing security challenges, approaches and solutions. Procedia Computer Science, 37, pp.357-362.
[19] Tadapaneni, Narendra Rao. "Different Types of Cloud Service Models." (2017).
[20] Waqas, Muhammad & Khuhro, Mansoor & Saeed, Umair & Kumar, Kamlesh & Mirbahar, Naadiya & Rajab Khan, Ruqiya. (2021). Security Awareness on Ransomware Threats Detection and their Protection Techniques. International Journal of Advanced Trends in Computer Science and Engineering. 10. 975 – 983.
[21] Tabrizchi, H. and Kuchaki Rafsanjani, M., 2020. A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), pp.9493-9532.
[22] Milkaite, I. and Lievens, E., 2020. Child-friendly transparency of data processing in the EU: from legal requirements to platform policies. Journal of Children and Media, 14(1), pp.5-21.
[23] Winkler, Vic JR. Securing the Cloud: Cloud computer Security techniques and tactics. Elsevier, 2011.
[24] Martin, H., Ma, Z., Schmittner, C., Winkler, B., Krammer, M., Schneider, D., Amorim, T., Macher, G. and Kreiner, C., 2020. Combined automotive safety and security pattern engineering approach. Reliability Engineering & System Safety, 198, p.106773.