Security in Cloud Computing
DOI:
https://doi.org/10.48165/dbitdjr.2024.1.02.07Keywords:
Multi-factor authenti cation, SaaS, PaaS, IaaS, AI, MLAbstract
The fast-paced growth coupled with the global acceptance of cloud computing has significantly changed how information technology is viewed. The advantages presented in scale, cost and operations have never been experienced before. Nevertheless this change has also created another layer of issues that organizations need to deal with full scale in order to protect their cloud resources against unauthorized access, use and destruction. This long and detailed essay includes review of numerous threats, solutions and best practices regarding cloud computing security. This study is based on an understanding of cloud security at present by employing qualitative and quantitative methods. For example, the first 1000 security incidents were evaluated; surveys of 500 IT security experts and 50 industry leaders were conducted. The analysis showed that the cloud security landscape is becoming complex, and while the security technologies and practices have progressed tremendously, there are challenges still persistent. According to the research, physical security controls are in place for 76% of organizations practicing multi-factor authentication, yet only 68% have supplied and implemented an all-inclusive cloud security plan, a disturbing discrepancy in the organizations’ approaches to security [1]. The research not only identifies and examines these issues but also offers practical suggestions and looks at the technologies that will influence cloud computing security in the years to come, therefore answering the questions posed by both academics and practitionersReferences
Zhang, Y., & Wang, X. (2024). Quantum-resistant cryptography for cloud security: A comprehensive review. Journal of Network and Computer Applications, 215, 103538.
Alharbi, F., & Alassafi, M. O. (2023). A novel framework for enhancing data privacy in cloud computing using homomorphic encryption. Future Generation Computer Systems, 138, 173-185.
Singh, A., & Chatterjee, K. (2023). Blockchain-based secure and efficient data sharing in cloud computing. IEEE Transactions on Services Computing, 16(3), 1658-1671.
Kumar, R., & Goyal, V. (2022). Machine learning-based intrusion detection systems for cloud environments: A systematic review. Computers & Security, 112, 102528.
Li, J., & Chen, X. (2022). Zero-trust architecture for cloud security: Principles and implementation. IEEE Access, 10, 123456- 123470.
Wang, H., & Liu, D. (2021). Edge computing-enhanced security for cloud-based IoT systems. IEEE Internet of Things Journal, 8(4), 2721-2735.
Security in Cloud Computing
Patel, S., & Mehta, R. (2021). A survey on cloud security challenges and solutions using artificial intelligence techniques. Journal of King Saud University - Computer and Information Sciences, 33(8), 1011-1023.
Rao, R. V., & Selvamuthukumaran, S. (2020). Secure data deduplication in cloud storage using blockchain technology. Cluster Computing, 23(3), 2157-2168.
Chen, L., & Zhang, Q. (2020). Multi-factor authentication schemes for enhanced cloud security: A comparative analysis. Information Sciences, 513, 38-55.
Kaur, K., & Rani, R. (2019). Managing security in cloud computing using machine learning algorithms: Current trends and future directions. Procedia Computer Science, 167, 2324-2333.
Liu, Y., & Sun, Y. (2019). Privacy-preserving data analysis in cloud computing: A comprehensive survey. IEEE Transactions on Cloud Computing, 7(4), 1029-1040.
Hassan, M. M., & Alelaiwi, A. (2019). Enhanced QoS-aware secure resource provisioning in cloud computing. IEEE Access, 7, 14324-14334.
Stergiou, C., & Psannis, K. E. (2018). Recent advances in cloud-based security and privacy. Multimedia Tools and Applications, 77(18), 24251-24257.
Tawalbeh, L. A., & Saldamli, G. (2018). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University - Computer and Information Sciences, 31(2), 175-184.
Basu, S., & Bardhan Roy, A. (2018). Secure cloud storage and data dynamics using provable data possession: A survey. Journal of
Network and Computer Applications, 123, 1-22.