The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
Keywords: Cloud computing, Data management, Computational resources, Authentication, Confidentiality, Data security.
[1] Ali M., Khan SU., Vasilakos AV. (2015). Security in cloud computing: opportunities and challenges. Inf Sci., 2015: 357–383.
[2] AlShehri MAR., Mishra S. (2019). Feature based comparison and selection of SDN controller. Int J Innov Technol Manag., 16(05): 1–23.
[3] Avram MG. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol., 2014: 529–534.
[4] Bellini P., Cenni D., Nesi P. (2015). Smart cloud engine and solution based on knowledge base. Procedia Comput Sci., 2015: 3–16.
[5] De Oliveira AS. (2018). Modelling trust and risk for cloud services. J Cloud Comput., 7(1): 7–14.
[6] Chen HC., Lee PP. (2013). Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation. IEEE Trans Parallel Distrib Syst., 25(2): 407–416.
[7] Coppolino L., D’Antonio S., Mazzeo G., Romano L. (2017). Cloud security: Emerging threats and current solutions. Comput & Electr Eng., 2017: 126–140.
[8] Hong JB., Nhlabatsi A, Kim DS., Hussein A., Fetais N., Khan KM. (2019). Systematic identification of threats in the cloud: A survey. Comput Netw., 2019: 46–69.
[9] Benabied, S., Zitouni, A., & Djoudi, M. (2015). A cloud security framework based on trust model and mobile agent. In 2015 International Conference on Cloud Technologies and Applications, pp. 1–8.
[10] Abusaimeh, H. (2020). Security Attacks in Cloud Computing and Corresponding Defending Mechanisms. International Journal of Advanced Trends in Computer Science and Engineering, 9(3).
[11] Dheyab, O. A., Turki, A. I., & Rahmatullah, B. (2018). Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq. The Journal of Social Sciences Research, pp. 599–606. DOI: 10.32861/jssr.spi6.599.606.
[12] Jamil, D., & Zaki, H. (2011). Security issues in cloud computing and countermeasures. International Journal of Engineering Science and Technology (IJEST), 3(4): 2672–2676.
[13] Abdul-Jabbar, S. S., Aldujaili, A., Mohammed, S. G., & Saeed, H. S. (2020). Integrity and Security in Cloud Computing Environment: A Review. Journal of Southwest Jiaotong University, 55(1).
[14] De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A., & Mazzara, M. (2019). Cyber-storms come from clouds: Security of cloud computing in the IoT era. Future Internet, 11(6): 127. DOI: 10.3390/fi11060127.
[15] Qi, Q., & Tao, F. (2019). A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access, 7: 86769–86777. DOI: 10.1109/ACCESS.2019.2923610.
[16] Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management, 3(3): 171–176.
[17] Singh, J. (2014). Cyber-attacks in cloud computing: A case study. International Journal of Electronics and Information Engineering, 1(2): 78–87.
A New Issue was published – Volume 8, Issue 4, 2025
10-10-2025 11-07-2025