A Review on Cloud Computing Threats, Securityand Possible Solutions
Journal Title: International Journal of Innovations in Science and Technology - Year 2024, Vol 6, Issue 3
Abstract
loud computing is increasingly popular, with major companies like Microsoft, Google, and Amazon creating expansive cloud environments to support vast user bases. Despite its benefits, security remains a significant concern, complicating full trust in cloud solutions due to potential hazards and the consequences of security breaches. This study introduces a novel approach to address the gaps in existing frameworks for summarizing and analyzing cloud security issues and requirements. We explored various cloud computing security challenges, assessed the impact of different cloud models, and discussed risk mitigation techniques and policies for both cloud providers and users. Our analysis offers a comprehensive examination of security risks affecting cloud computing, alongside the latest security solutions. Rather than focusing solely on specific issues, we presented a broader perspective on advanced, high-level security frameworks. We outlined multiple strategies for developing a secure, reliable, and cost-effective cloud infrastructure.
Authors and Affiliations
Hafiz Muhammad Faisal Shehzad, Rabia Naz, Asia Muneer, Abid Rafiq, Samreen Razzaq, Mudassar Ali Shah Zaidi
VDMF: VANETsDetection Mechanism Using Fog Computing forCollusion and Sybil Attacks
Vehicular Ad Hoc Networks (VANETs) have evolved as a key component of the intelligent transportation system, enhancing road safety and traffic efficiency. It is crucial to secure sensitive information, and detection of...
Deep Learning-Based Automated Classroom Slide Extraction
Automated extraction of valuable content from real-time classroom lectures holds significant potential for enhancing educational accessibility and efficiency. However, capturing the spontaneous insights of live lecture...
Efficient Region-Based Video Text Extraction Using Advanced Detection and Recognition Models
his paper presents an automated process for extracting text from video frames by specifically targeting text-rich regions, identified through advanced scene text detection methods. Unlike traditional techniques that ap...
A Large Language Model-based Web Application for Contextual Document Conversation
The emergence of Large Language Models (LLM), such as ChatGPT, Gemini, and Claude has ushered in a new era of natural language processing, enabling rich textual interactions with computers. However, despite the capab...
Comparison of IoT Messaging Protocols: A novel Crop-Specific Protocolfor Wheat, Banana,and Chili
IoT systems mostly depend on messaging protocols to facilitate the exchange of IoT data, with various protocols or frameworks available to support different types of messaging patterns. Choosing a suitable IoT messagin...