Review on Information Security Risk and Control Measures Based on Cloud Computing Environment


Authors : Abdulrahman Malik Haji; Suleiman Abdalla Baho

Volume/Issue : Volume 10 - 2025, Issue 9 - September


Google Scholar : https://tinyurl.com/yu7fj8az

Scribd : https://tinyurl.com/3dux6usp

DOI : https://doi.org/10.38124/ijisrt/25sep164

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : The high cost of data security breaches raises the reputation of information security for all information users. Public and governmental organizations that offer information services to citizens must protect their services and train their employees to safeguard their information assets. To ensure the stability and efficiency of the data services, several users and organizations are shifting their services to cloud environments. Cloud computing provides services to users including Software as Services (SaaS), Infrastructure as a Services (IaaS), and Platform as a services (PaaS) with high degree of data confidentiality, integrity, and availability but observation show that there is a major problem of data leaking and attacks on the organization setup which therefore hindering the effectiveness of cloud services among users. This paper reviews the potential risks related to cloud computing and determines control measures to overcome the data privacy issue based on the general and architectural cloud environment.

Keywords : Cloud Computing, Cloud Attacks, Security Architecture, Shared Responsibility Model.

References :

  1. Rizwana A.R. Shaikh Masooda M. Modak "Measuring Data Security for a Cloud Computing Service  2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pages: 1 – 5.
  2. Preeti Sirohi Amit Agarwal Cloud  computing data storage security framework relating to data integrity, privacy and trust 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Pages: 115 – 118.
  3. Fuguo Li, “Study on security and prevention strategies of computer network2012 International Conference on Computer Science and Information Processing (CSIP).
  4. Ronald L, Krutz and Rusell Dean Vines “A Comprehensive Guide to Secure Cloud Computing” Wiley Publishing.Inc, 2010. Page 177-190.
  5. What's Special about Cloud Security? Peter Mell IT Professional Year: 2012 Volume: 14, Pages: 6 – 8
  6. Deepak R Bharadwaj Anamika Bhattacharya Manivannan Chakkaravarthy 'Cloud Threat Defense – A Threat Protection and Security Compliance Solution”  2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
  7. A Semantic Approach to Cloud Security and ComplianceAmit Hendre Karuna Pande Joshi 2015 IEEE 8th International Conference on Cloud Computing Year: 2015 Pages: 1081 – 1084.
  8. Randeep Kaur Jagroop Kaur "Cloud computing security issues and its solution: A review 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom)   Pages: 1198 – 1200.
  9. Xiaoling Sun “The study on computer network security and precautionProceedings of 2011 International Conference on Computer Science and Network Technology. Volume: 3 Pages: 1695 – 1698
  10. Asım Gençer GökceThe public information systems security program International Conference on Information Society  (Society 2012), Pages: 352
  11. Teaching for Conceptual Change in Security Awareness Yuen-Yan Chan Victor K. Wei IEEE Security & Privacy,  2008 Volume: 6 , Issue: 6, Pages: 67 – 69
  12. Security Oriented Malicious Activity Diagrams to Support Information Systems Security Othmar O. Mwambe Isao Echizen 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), Pages: 74 – 81
  13. Study on Data Security Policy Based on Cloud StorageDiao Zhe Wang Qinghong Su Naizheng Zhang Yuhan 2017, Pages: 145 – 149
  14. Data Access Security in Cloud Computing: A Review Anagha Markandey Prajakta Dhamdhere Yogesh Gajmal 2018 International Conference on Computing, Power and Communication Technologies (GUCON). Pages: 633 – 636
  15. Security risks and their management in cloud computing Afnan Ullah Khan Manuel Oriol Mariam Kiran Ming Jiang Karim Djemame 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012, Pages: 121 – 128.
  16. Microsoft “Shared Responsibility for Cloud Computing” April 2017, Version two.
  17. Udupa A, T., Jayaram, S., & Hegde, S. G. (2024). A Brief Study of Computer Network Security Technologies. arXiv e-prints, arXiv-2403.
  18. Bibartiu, O., Dürr, F., Rothermel, K., Ottenwälder, B., & Grau, A. (2024). Availability analysis of redundant and replicated cloud services with Bayesian networks. Quality and Reliability Engineering International, 40(1), 561-584.
  19. Krishna, G. J. (2024). Serial Parallel Reliability Redundancy Allocation Optimization for Energy Efficient and Fault Tolerant Cloud Computing. arXiv preprint arXiv:2404.03665.
  20. Sharma, T., Wang, T., Di Giulio, C., & Bashir, M. (2020). Towards inclusive privacy protections in the cloud. In Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings 18 (pp. 337-359). Springer International Publishing.
  21. Bomström, T. (2024). Case study: cloud computing model for vehicular data processing (Master's thesis, T. Bomström).
  22. Kumar, A., Rani, S., Rathee, S., & Bhatia, S. (Eds.). (2023). Security and risk analysis for intelligent cloud computing: methods, applications, and preventions. CRC Press.
  23. Taneja, A. K., Kumawat, P., & Asthana, B. SECURITY ISSUES ON CLOUD COMPUTING.
  24. Khan, W. (2023). Developing and delivering comprehensive cloud security training programs: The importance of continuous education in maintaining high levels of security awareness. International Journal of Advanced Research in Engineering and Technology, 14(7), 132–156.

The high cost of data security breaches raises the reputation of information security for all information users. Public and governmental organizations that offer information services to citizens must protect their services and train their employees to safeguard their information assets. To ensure the stability and efficiency of the data services, several users and organizations are shifting their services to cloud environments. Cloud computing provides services to users including Software as Services (SaaS), Infrastructure as a Services (IaaS), and Platform as a services (PaaS) with high degree of data confidentiality, integrity, and availability but observation show that there is a major problem of data leaking and attacks on the organization setup which therefore hindering the effectiveness of cloud services among users. This paper reviews the potential risks related to cloud computing and determines control measures to overcome the data privacy issue based on the general and architectural cloud environment.

Keywords : Cloud Computing, Cloud Attacks, Security Architecture, Shared Responsibility Model.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe