Major Security Threats and Attacks that Facing Cloud Computing with the Main Defence Strategies
DOI:
https://doi.org/10.26713/cma.v13i1.1973Keywords:
Cloud computing, Attack, Threats, Solutions and strategieAbstract
Cloud Computing (Cloud) enables ubiquitous network access to a pool of shared and configurable resources. It is based on shared services and infrastructure convergence. Cloud computing offers a slew of advantages, including the ability to store large amounts of data and a variety of services, as well as addressing the issue of scarce resources and lowering service costs. Regardless of its benefits,
the shift from local to remote computing has created a slew of security concerns and challenges for both consumer and provider. Addressing and evaluating cloud computing challenges is critical. Thus, by discussing cloud computing challenges alongside available and potential solutions, users, developers, and businesses can identify pertinent and timely responses to specific threats, resulting in the best possible cloud computing-based services. The purpose of this article is to discuss the inherent difficulties associated with cloud computing and some critical solutions for overcoming them. This article extracted and analyzed seminal papers in order to contribute to the corpus of literature by highlighting several critical challenges in the cloud computing domain and shedding light on how these challenges affect a variety of domains, including users, sites, and business. The most frequently mentioned challenges include data loss, data breaches, account or service hijacking, insecure interfaces and APIs, malicious insiders, insufficient due diligence, abusive cloud service use, shared technology issues, unknown risk profile, identity theft, business model changes, lock-in, cryptography, cloud data recycling, malware, and untrusted computing. This paper addressed these issues by incorporating previously discovered solutions. There has been discussion of the implications for both researchers and practitioners.
Downloads
References
N. Amara, H. Zhiqui and A. Ali, Cloud computing security threats and attacks with their mitigation techniques, in: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2017, pp. 244 – 251, DOI: 10.1109/CyberC.2017.37.
R. Barona and E. A. M. Anita, A survey on data breach challenges in cloud computing security: Issues and threats, in: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1 – 8, 2017, DOI: 10.1109/ICCPCT.2017.8074287.
S. Basu, A. Bardhan, K. Gupta, P. Saha, M. Pal, M. Bose, K. Basu, S. Chaudhury and P. Sarkar, Cloud computing security challenges & solutions – A survey, in: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018, pp. 347 – 356, DOI: 10.1109/CCWC.2018.8301700.
M. A. Elmagzoub, D. Syed, A. Shaikh, N. Islam, A. Alghamdi and S. A. Rizwan, A survey of swarm intelligence based load balancing techniques in cloud computing environment, Electronics 10(21) (2021), 2718, DOI: 10.3390/electronics10212718.
M. Kaur and H. Singh, A review of cloud computing security issues, International Journal of Grid Distribution Computing 8(5) (2015), 215 – 222, DOI: 10.14257/ijgdc.2015.8.5.21.
I. M. Khalil, A. Khreishah and M. Azeem, Cloud computing security: A survey, Computers 3(1) (2014), 1 – 35, DOI: 10.3390/computers3010001.
P. R. Kumar, P. H. Raj and P. Jelciana, Exploring data security issues and solutions in cloud computing, Procedia Computer Science 125 (2018), 691 – 697, DOI: 10.1016/j.procs.2017.12.089.
M. A. Nadeem, Cloud computing: security issues and challenges, Journal of Wireless Communications 1(1) (2016), 10 – 15, DOI: 10.21174/jowc.v1i1.73.
M. D. Ryan, Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software 86(9) (2013), 2263 – 2268, DOI: 10.1016/j.jss.2012.12.025.
D. Sgandurra and E. Lupu, Evolution of attacks, threat models, and solutions for virtualized systems, ACM Computing Surveys 48(3) (2016), 1 – 38, DOI: 10.1145/2856126.
F. B. Shaikh and S. Haider, Security threats in cloud computing in: 2011 International Conference for Internet Technology and Secured Transactions, pp. 214 – 219, 2011.
A. Singh and K. Chatterjee, Cloud security issues and challenges: A survey, Journal of Network and Computer Applications 79 (2017), 88 – 115, DOI: 10.1016/j.jnca.2016.11.027.
N. Subramanian and A. Jeyaraj, Recent security challenges in cloud computing, Computers & Electrical Engineering 71 (2018), 28 – 42, DOI: 10.1016/j.compeleceng.2018.06.006.
P. Sun, Security and privacy protection in cloud computing: Discussions and challenges, Journal of Network and Computer Applications 160 (2020), 102642, DOI: 10.1016/j.jnca.2020.102642.
H. Tabrizchi and M. K. Rafsanjani, A survey on security challenges in cloud computing: issues, threats, and solutions, The Journal of Supercomputing 76(12) (2020), 9493 – 9532, DOI: 10.1007/s11227-020-03213-1.
A. Verma and S. Kaushal, Cloud computing security issues and challenges: A survey, in: A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki and S. M. Thampi (eds.), International Conference on Advances in Computing and Communications, 2011, pp. 445 – 454, Springer, Berlin — Heidelberg, DOI: 10.1007/978-3-642-22726-4_46.
S. Zhang, S. Zhang, X. Chen and X. Huo, Cloud computing research and development trend, in: 2010 Second International Conference on Future Networks, 2010, pp. 93 – 97, DOI: 10.1109/ICFN.2010.58.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.