A Review on Cloud Computing Threats, Securityand Possible Solutions

Abstract

loud computing is increasingly popular, with major companies like Microsoft, Google, and Amazon creating expansive cloud environments to support vast user bases. Despite its benefits, security remains a significant concern, complicating full trust in cloud solutions due to potential hazards and the consequences of security breaches. This study introduces a novel approach to address the gaps in existing frameworks for summarizing and analyzing cloud security issues and requirements. We explored various cloud computing security challenges, assessed the impact of different cloud models, and discussed risk mitigation techniques and policies for both cloud providers and users. Our analysis offers a comprehensive examination of security risks affecting cloud computing, alongside the latest security solutions. Rather than focusing solely on specific issues, we presented a broader perspective on advanced, high-level security frameworks. We outlined multiple strategies for developing a secure, reliable, and cost-effective cloud infrastructure.

Authors and Affiliations

Hafiz Muhammad Faisal Shehzad, Rabia Naz, Asia Muneer, Abid Rafiq, Samreen Razzaq, Mudassar Ali Shah Zaidi

Keywords

Related Articles

VDMF: VANETsDetection Mechanism Using Fog Computing forCollusion and Sybil Attacks

Vehicular Ad Hoc Networks (VANETs) have evolved as a key component of the intelligent transportation system, enhancing road safety and traffic efficiency. It is crucial to secure sensitive information, and detection of...

Deep Learning-Based Automated Classroom Slide Extraction

Automated extraction of valuable content from real-time classroom lectures holds significant potential for enhancing educational accessibility and efficiency. However, capturing the spontaneous insights of live lecture...

Efficient Region-Based Video Text Extraction Using Advanced Detection and Recognition Models

his paper presents an automated process for extracting text from video frames by specifically targeting text-rich regions, identified through advanced scene text detection methods. Unlike traditional techniques that ap...

A Large Language Model-based Web Application for Contextual Document Conversation

The emergence of Large Language Models (LLM), such as ChatGPT, Gemini, and Claude has ushered in a new era of natural language processing, enabling rich textual interactions with computers. However, despite the capab...

Comparison of IoT Messaging Protocols: A novel Crop-Specific Protocolfor Wheat, Banana,and Chili

IoT systems mostly depend on messaging protocols to facilitate the exchange of IoT data, with various protocols or frameworks available to support different types of messaging patterns. Choosing a suitable IoT messagin...

Download PDF file
  • EP ID EP760438
  • DOI -
  • Views 20
  • Downloads 0

How To Cite

Hafiz Muhammad Faisal Shehzad, Rabia Naz, Asia Muneer, Abid Rafiq, Samreen Razzaq, Mudassar Ali Shah Zaidi (2024). A Review on Cloud Computing Threats, Securityand Possible Solutions. International Journal of Innovations in Science and Technology, 6(3), -. https://europub.co.uk/articles/-A-760438