Authors :
Abdulrahman Malik Haji; Suleiman Abdalla Baho
Volume/Issue :
Volume 10 - 2025, Issue 9 - September
Google Scholar :
https://tinyurl.com/yu7fj8az
Scribd :
https://tinyurl.com/3dux6usp
DOI :
https://doi.org/10.38124/ijisrt/25sep164
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
The high cost of data security breaches raises the reputation of information security for all information users.
Public and governmental organizations that offer information services to citizens must protect their services and train
their employees to safeguard their information assets. To ensure the stability and efficiency of the data services, several
users and organizations are shifting their services to cloud environments. Cloud computing provides services to users
including Software as Services (SaaS), Infrastructure as a Services (IaaS), and Platform as a services (PaaS) with high
degree of data confidentiality, integrity, and availability but observation show that there is a major problem of data
leaking and attacks on the organization setup which therefore hindering the effectiveness of cloud services among users.
This paper reviews the potential risks related to cloud computing and determines control measures to overcome the data
privacy issue based on the general and architectural cloud environment.
Keywords :
Cloud Computing, Cloud Attacks, Security Architecture, Shared Responsibility Model.
References :
- Rizwana A.R. Shaikh ; Masooda M. Modak "Measuring Data Security for a Cloud Computing Service” 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pages: 1 – 5.
- Preeti Sirohi ; Amit Agarwal “Cloud computing data storage security framework relating to data integrity, privacy and trust” 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Pages: 115 – 118.
- Fuguo Li, “Study on security and prevention strategies of computer network” 2012 International Conference on Computer Science and Information Processing (CSIP).
- Ronald L, Krutz and Rusell Dean Vines “A Comprehensive Guide to Secure Cloud Computing” Wiley Publishing.Inc, 2010. Page 177-190.
- What's Special about Cloud Security? Peter Mell IT Professional Year: 2012 Volume: 14, Pages: 6 – 8
- Deepak R Bharadwaj ; Anamika Bhattacharya ; Manivannan Chakkaravarthy 'Cloud Threat Defense – A Threat Protection and Security Compliance Solution” 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
- “A Semantic Approach to Cloud Security and Compliance “Amit Hendre ; Karuna Pande Joshi 2015 IEEE 8th International Conference on Cloud Computing Year: 2015 Pages: 1081 – 1084.
- Randeep Kaur ; Jagroop Kaur "Cloud computing security issues and its solution: A review “ 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) Pages: 1198 – 1200.
- Xiaoling Sun “The study on computer network security and precaution” Proceedings of 2011 International Conference on Computer Science and Network Technology. Volume: 3 Pages: 1695 – 1698
- Asım Gençer Gökce “The public information systems security program” International Conference on Information Society (Society 2012), Pages: 352
- ”Teaching for Conceptual Change in Security Awareness” Yuen-Yan Chan ; Victor K. Wei IEEE Security & Privacy, 2008 Volume: 6 , Issue: 6, Pages: 67 – 69
- “Security Oriented Malicious Activity Diagrams to Support Information Systems Security” Othmar O. Mwambe ; Isao Echizen 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), Pages: 74 – 81
- “Study on Data Security Policy Based on Cloud Storage “Diao Zhe ; Wang Qinghong ; Su Naizheng ; Zhang Yuhan 2017, Pages: 145 – 149
- ”Data Access Security in Cloud Computing: A Review “ Anagha Markandey ; Prajakta Dhamdhere ; Yogesh Gajmal 2018 International Conference on Computing, Power and Communication Technologies (GUCON). Pages: 633 – 636
- “Security risks and their management in cloud computing” Afnan Ullah Khan ; Manuel Oriol ; Mariam Kiran ; Ming Jiang ; Karim Djemame 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012, Pages: 121 – 128.
- Microsoft “Shared Responsibility for Cloud Computing” April 2017, Version two.
- Udupa A, T., Jayaram, S., & Hegde, S. G. (2024). A Brief Study of Computer Network Security Technologies. arXiv e-prints, arXiv-2403.
- Bibartiu, O., Dürr, F., Rothermel, K., Ottenwälder, B., & Grau, A. (2024). Availability analysis of redundant and replicated cloud services with Bayesian networks. Quality and Reliability Engineering International, 40(1), 561-584.
- Krishna, G. J. (2024). Serial Parallel Reliability Redundancy Allocation Optimization for Energy Efficient and Fault Tolerant Cloud Computing. arXiv preprint arXiv:2404.03665.
- Sharma, T., Wang, T., Di Giulio, C., & Bashir, M. (2020). Towards inclusive privacy protections in the cloud. In Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings 18 (pp. 337-359). Springer International Publishing.
- Bomström, T. (2024). Case study: cloud computing model for vehicular data processing (Master's thesis, T. Bomström).
- Kumar, A., Rani, S., Rathee, S., & Bhatia, S. (Eds.). (2023). Security and risk analysis for intelligent cloud computing: methods, applications, and preventions. CRC Press.
- Taneja, A. K., Kumawat, P., & Asthana, B. SECURITY ISSUES ON CLOUD COMPUTING.
- Khan, W. (2023). Developing and delivering comprehensive cloud security training programs: The importance of continuous education in maintaining high levels of security awareness. International Journal of Advanced Research in Engineering and Technology, 14(7), 132–156.
The high cost of data security breaches raises the reputation of information security for all information users.
Public and governmental organizations that offer information services to citizens must protect their services and train
their employees to safeguard their information assets. To ensure the stability and efficiency of the data services, several
users and organizations are shifting their services to cloud environments. Cloud computing provides services to users
including Software as Services (SaaS), Infrastructure as a Services (IaaS), and Platform as a services (PaaS) with high
degree of data confidentiality, integrity, and availability but observation show that there is a major problem of data
leaking and attacks on the organization setup which therefore hindering the effectiveness of cloud services among users.
This paper reviews the potential risks related to cloud computing and determines control measures to overcome the data
privacy issue based on the general and architectural cloud environment.
Keywords :
Cloud Computing, Cloud Attacks, Security Architecture, Shared Responsibility Model.