The Latest Classification of Cloud Computing Security Issues: Challenges, Attacks and Solutions

Document Type : tarvigi

Authors

1 Department of Information Technology, Faculty of Artificial Intelligence and Cognitive Sciences, Imam Hossein University (AS), Tehran

2 Assistant Professor, Computer Faculty, Imam Hossein University (AS)

Abstract

cloud computing has revolutionized internet service with its advent. in cloud computing, security is the most important goal and the main requirement of a system. as cloud computing develops, a set of security problems appears. security problems are a strong obstacle to the adaptation of users to cloud computing systems. cloud security is becoming a key distinction and competitive advantage between cloud providers. this paper presents some cloud computing systems and analyzes the problem of cloud computing and its strategy with regard to the concepts and features of cloud computing. this paper tries to provide a comprehensive overview of cloud computing security and some of the key research challenges of cloud computing security. in this paper, the latest and most important cloud security issues such as data security, data secrecy, program security and challenges, attacks and solutions to deal with them with the development of cloud computing have been discussed. in the end, special security issues including the identity of access credit, development of insecure software, and third- party sources were investigated.

Keywords


Smiley face

[1]  A. Bahadur and A. Sadeghi, "Security in cloud computing based on network security based on intelligent methods," Applied Science Studies in Engineering, pp. 65-74, 2019.
[2]  N. Mansoori and B. Mohammad Hassanizadeh, and R. Ghafari "Security-based work scheduling algorithm using particle swarm optimization technique and multiple adaptive learning to improve security in cloud computing environment" Electronic and Cyber Defense 159-178 pp, 2019.
 [3] J. Michael Brook,  A . Stone Getsin, and M. Roza, “Top Threats to Cloud Computing”2022
 [4]I. Kanwal, H. Shafi, S. Memon, and M. H. Shah, "Cloud computing security challenges: A review," in Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, pp. 459-469, Springer, January 2021.
[5]A. G. Prabhu, A. Narayanan, and C. Kurian, "A Study on Security ISSUES in SaaS Cloud Computing," 2021.
[6] H. P. Singh, R. Singh, and V. Singh, "Cloud computing security issues, challenges and solutions," Easy Chair, pp.      2516-2314, 2020.
[7] A. Kumar and K. A. Kumar, "A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review," International Journal of Human Computations & Intelligence, vol. 1, no. 3, pp. 13-18, 2022.
[8] N. B. Muhammad and M. Bazzi, "Advances in Cloud Computing: Security Issues and Challenges in the Cloud," in 2022 5th International Conference on Information and Computer Technologies (ICICT), 2022: IEEE, pp. 110-116.
[9] A. H. Shaikh and B. Meshram, "Security issues in cloud computing," in Intelligent Computing and Networking: Proceedings of IC-ICN 2020, Springer, pp. 63-77, 2021.
[10] I. Indu, P. R. Anand, and V. Bhaskar, "Identity and access management in cloud environment: Mechanisms and challenges," Engineering science and technology, an international journal, vol. 21, no. 4, pp. 574-588, 2018.
[11] A. Sunyaev and A. Sunyaev, "Cloud computing," Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies, pp. 195-236, 2020.
[12] v. Shahi and M. Naqvi, "Investigation and evaluation of new models of data security in cloud computing," Non-functional Defense Quarterly, vol. 8, no. 2, pp. 35-42, 2017.
[13] K. Abbas, "DDoS Survey and Arrangements," 2019.
[14] P. Kumar, "Cloud computing: threats, attacks and solutions," International Journal of Emerging Technologies in Engineering Research (IJETER), vol. 4, no. 8, pp. 24-28, 2016.
[15] D. Stiawan, M. E. Suryani, M. Y. Idris, M. N. Aldalaien, N. Alsharif, and R. Budiarto, "Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network," IEEE Access, vol. 9, pp. 116475-116484, 2021.
پایگاه­های اینترنتی:
[16] A Comprehensive Guide to Cloud Security in 2023 (Risks, Best Practices, Certifications) Edward Jones, October 28, 2022.
[17] Cloud Computing Security Issues https://www.skyhighsecurity.com/en-us/cybersecurity-defined/cloud-computing-security-issues                                 [18] Gartner Security and Risk Management Summit                 https://www.gartner.com/en/conferences/emea/security-risk-management-uae/featured-topics/cloud-security
[19] What is a cloud firewall? What is firewall-as-a-service (FWaaS)? https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/
Volume 14, Issue 4 - Serial Number 56
December 2023
Pages 111-127
  • Receive Date: 13 March 2023
  • Revise Date: 26 June 2023
  • Accept Date: 07 August 2023
  • Publish Date: 22 December 2023