Open Access Open Access  Restricted Access Subscription or Fee Access

Unveiling Cloud Computing’s Security Challenges.

Shalini Singh, Monu Yadav

Abstract


As organizations increasingly embrace cloud computing, concerns surrounding security threats in the environment have become more prevalent. This white paper alms to address these concerns by offering a comprehensive analysis of the various security threats that can affect cloud computing. Our research delves into the intricacies of virtualized infrastructure, examining potential issues and vulnerabilities that arise in this context. We investigate the challenges associated with securing the software platform, including identity management and access control mechanisms. Furthermore, we explore critical aspects such as data integrity, confidentiality, and privacy within the cloud. Finally, it   outlines a series of high-level steps that you can use to assess your security readiness for moving business applications to the cloud.

 


Keywords


cloud security,Data processing,security, encryption,multi-device

Full Text:

PDF

References


Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January). Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.

Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In 2011 World Congress on Information and Communication Technologies (pp. 217-222). IEEE.

Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In 2012 international conference on computer science and electronics engineering (Vol. 1, pp. 647-651). IEEE.

Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future generation computer systems, 29(5), 1278-1299.

Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer applications, 40, 325-344.

Wang, C., Ren, K., Lou, W., & Li, J. (2010). Toward publicly auditable secure cloud data storage services. IEEE network, 24(4), 19-24.

Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.

Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903.

Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., & Ghafoor, A. (2011). A distributed access control architecture for cloud computing. IEEE software, 29(2), 36-44.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Telecommunication, Switching Systems and Networks