Cloud Computing Security Threats and Responses

Authors

  • Saurabh Kansal Independent Researcher, USA Author

DOI:

https://doi.org/10.32628/IJSERSET242433

Keywords:

Cloud Computing, Security Threats, Attack Vectors, Multi-Cloud Environments, Regulatory Compliance, Encryption, Zero-Trust Architecture

Abstract

Currently some of the most preferred models of technology delivery are cloud computing models of technology, which have dramatically transformed data management and storage but have also resulted in sophisticated risks. In this paper, we will analysis the development of cloud security threats, typical threats, and new threats in multi-cloud environments. Security enhancements are outlined, and the array of shortcomings of previous security solutions are presented, as well as prospects and challenges related to compliance. It is found that for combating these threats, there is need for implementational security measures, responsive technologies and standardized policies across the world. New ideas like zero-trust security and cryptographic forms are also stated to address the risks. This review’s implication, therefore, is that there should be partnerships in realizing safer and more robust clouds.

Downloads

Download data is not yet available.

References

Afolaranmi, S.O., 2018. Multi-cloud Security Mechanisms for Smart Environments (Master's thesis).

Agarwal, A., Siddharth, S. and Bansal, P., 2016, March. Evolution of cloud computing and related security concerns. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-9). IEEE.

Ahmad, N., 2017, March. Cloud computing: Technology, security issues and solutions. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 30-35). IEEE.

Capellupo, M., Liranzo, J., Bhuiyan, M.Z.A., Hayajneh, T. and Wang, G., 2017. Security and attack vector analysis of IoT devices. In Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings 10 (pp. 593-606). Springer International Publishing.

Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M. and Pourzandi, M., 2012. A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1, pp.1-18.

Iankoulova, I. and Daneva, M., 2012, May. Cloud computing security requirements: A systematic review. In 2012 Sixth International Conference on Research Challenges in Information Science (RCIS) (pp. 1-7). IEEE.

Raj, P., Raman, A., Raj, P. and Raman, A., 2018. Multi-cloud management: Technologies, tools, and techniques. Software-Defined Cloud Centers: Operational and Management Technologies and Tools, pp.219-240.

Rizvi, S., Pipetti, R., McIntyre, N. and Todd, J., 2018, July. An attack vector for iot networks. In 2018 International Conference on Software Security and Assurance (ICSSA) (pp. 39-44). IEEE.

Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M.A. and Rashid, A., 2018. Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications, 101, pp.18-54.

Yimam, D. and Fernandez, E.B., 2016. A survey of compliance issues in cloud computing. Journal of Internet Services and Applications, 7, pp.1-12.

Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation computer systems, 28(3), pp.583-592.

Naveen Bagam. (2024). Machine Learning Models for Customer Segmentation in Telecom.Journal of Sustainable Solutions,1(4), 101–115. https://doi.org/10.36676/j.sust.sol.v1.i4.42

Bagam, N. (2023). Implementing Scalable Data Architecture for Financial Institutions.Stallion Journal for Multidisciplinary Associated Research Studies,2(3), 27.

Bagam, N. (2021). Advanced Techniques in Predictive Analytics for Financial Services.Integrated Journal for Research in Arts and Humanities,1(1), 117–126. https://doi.org/10.55544/ijrah.1.1.16

Harish Goud Kola. (2024). Real-Time Data Engineering in the Financial Sector.International Journal of Multidisciplinary Innovation and Research Methodology, ISSN: 2960-2068,3(3), 382–396. Retrieved from https://ijmirm.com/index.php/ijmirm/article/view/143.

Harish Goud Kola. (2022). Best Practices for Data Transformation in Healthcare ETL.Edu Journal of International Affairs and Research, ISSN: 2583-9993,1(1), 57–73. Retrieved from https://edupublications.com/index.php/ejiar/article/view/106.

Kola, H. G. (2018). Data warehousing solutions for scalable ETL pipelines. International Journal of Scientific Research in Science, Engineering and Technology, 4(8), 762. https://doi.org/10.1.1.123.4567.

Harish Goud Kola, " Building Robust ETL Systems for Data Analytics in Telecom ,IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.694-700, May-June-2019. Available at doi :https://doi.org/10.32628/CSEIT1952292.

Kola, H. G. (2022). Data security in ETL processes for financial applications. International Journal of Enhanced Research in Science, Technology & Engineering, 11(9), 55. https://ijsrcseit.com/CSEIT1952292

Bagam, N., Shiramshetty, S. K., Mothey, M., Kola, H. G., Annam, S. N., & Bussa, S. (2024). Optimizing SQL for BI in diverse engineering fields. International Journal of Communication Networks and Information Security, 16(5). https://ijcnis.org/

Yadav, Nagender & Bhardwaj, Abhijeet & Jeyachandran, Pradeep & Prasad, Prof & Jain, Shalu & Goel, Punit. (2024). Best Practices in Data Reconciliation between SAP HANA and BI Reporting Tools. 10.13140/RG.2.2.22669.86241

.Mothey, M. (2018). Software testing best practices in large-scale projects. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(6), 712–721. https://doi.org/10.32628/IJSRCSEIT

Annam, S. N. (2021). IT leadership strategies for high-performance teams. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(1), 302–317. https://doi.org/10.32628/CSEIT228127 94. Annam, S. N. (2022). Managing IT operations in a remote work environment. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 8(5), 353–368. https://doi.org/10.32628/CSEIT23902179

Das, A., Ramalingam, B., Sengar, H. S., Kumar, L., Singh, S. P., & Goel, P. (2023). Designing Distributed Systems for On-Demand Scoring and Prediction Services. International Journal of Current Science, 13(4), 514.

Sengar, H. S., Pagidi, R. K., Ayyagari, A., Singh, S. P., Goel, P., & Jain, A. (2020). Driving Digital Transformation: Transition Strategies for Legacy Systems to Cloud-Based Solutions. International Research Journal of Modernization in Engineering, Technology, and Science, 2(10), 1068.

Sengar, H. S., Vadlamani, S., Kumar, A., Goel, O., Jain, S., & Agarwal, R. (2021). Building Resilient Data Pipelines for Financial Metrics Analysis Using Modern Data Platforms. International Journal of General Engineering and Technology (IJGET) 10 (1): 263, 282.

Sengar, H. S., Kankanampati, P. K., Tangudu, A., Jain, A., Goel, O., & Kumar, L. (2021). Architecting Effective Data Governance Models in a Hybrid Cloud Environment. International Journal of Progressive Research in Engineering Management and Science 1 (3): 38–51. doi: https://www.doi.org/10.58257/IJPREMS39.

Downloads

Published

20-12-2024

Issue

Section

Research Articles

How to Cite

[1]
Saurabh Kansal, “Cloud Computing Security Threats and Responses”, Int J Sci Res Sci Eng Technol, vol. 11, no. 6, pp. 414–424, Dec. 2024, doi: 10.32628/IJSERSET242433.

Similar Articles

1-10 of 126

You may also start an advanced similarity search for this article.