CFP last date
20 December 2024
Reseach Article

Gap Analysis of Security in the Cloud

by Afnan Alshahrani, M.A. El-dosuky
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 31
Year of Publication: 2022
Authors: Afnan Alshahrani, M.A. El-dosuky
10.5120/ijca2022922378

Afnan Alshahrani, M.A. El-dosuky . Gap Analysis of Security in the Cloud. International Journal of Computer Applications. 184, 31 ( Oct 2022), 30-35. DOI=10.5120/ijca2022922378

@article{ 10.5120/ijca2022922378,
author = { Afnan Alshahrani, M.A. El-dosuky },
title = { Gap Analysis of Security in the Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 31 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number31/32513-2022922378/ },
doi = { 10.5120/ijca2022922378 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:53.679399+05:30
%A Afnan Alshahrani
%A M.A. El-dosuky
%T Gap Analysis of Security in the Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 31
%P 30-35
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing (CC) is technical term for providing a plethora of Information Technology services to customers via networks. Usually, those services in CC are provided via third parties who own the infrastructures. It offers a practical business model for any organization to utilize Information Technology services without upfront details. However, an organization may not be in a hurry in adopting CC because of security issues. These issues are an active field that need to be handled in a proper way to avoid attacks and threats for both consumers and service providers. This paper scrutinizes CC attacks and threats with their techniques of mitigation and producing complete list of CC security threats. The paper also scrutinizes CC security gap and focuses on types of service delivery.

References
  1. Alam, T. (2021). Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1, 108-115.
  2. Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January). Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.
  3. Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
  4. Amara, N., Zhiqui, H., & Ali, A. (2017, October). Cloud computing security threats and attacks with their mitigation techniques. In 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (pp. 244-251). IEEE.
  5. Shaikh, A. H., & Meshram, B. B. (2021). Security issues in cloud computing. In Intelligent Computing and Networking (pp. 63-77). Springer, Singapore.
  6. Ahmed, I. (2019). A brief review: security issues in cloud computing and their solutions. Telkomnika, 17(6).
  7. Tadapaneni, N. R. (2017). Different Types of Cloud Service Models. Available at SSRN.
  8. Jaiswal, M. (2017). Cloud computing and Infrastructure. International Journal of Research and Analytical Reviews (IJRAR), E-ISSN, 2348-1269.
  9. Deepa.B, Srigayathri.S, & Visalakshi.S (2018). A Review on Cloud Computing. International Journal of Trend in Research and Development
  10. Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
  11. Choudhary, A. (2021, February 23). OWASP Cloud Top 10 - FAUN Publication. Medium. https://faun.pub/owasp-cloud-top-10-db4a3a8e0a8f .
  12. Al-Shqeerat, H. A. K., Al-Shrouf, F. M., Hassan, M. R., & Fajraoui, H. (2017). Cloud computing security challenges in higher educational institutions-A survey. International Journal of Computer Applications, 161(6), 22-29.
  13. Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., & Ullah, A. (2017). Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, 8(10), 183-195.
  14. Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
  15. Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January). Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE
  16. Salehi, A. W., Noori, F., & Saboori, R. (2019). Cloud Computing Security Challenges and its Potential Solution. American Journal of Engineering Research, 8(10), 165-175
  17. Mogull, R., Arlen, J., Gilbert, F., Lane, A., Mortman, D., Peterson, G., & Rothman, M. (2021). SECURITY GUIDANCE for critical areas of focus in cloud computing, v4. 0. Tokyo, Japan: Cloud Security Alliance.
  18. Silva Filho, M. C., Oliveira, R. L., Monteiro, C. C., Inácio, P. R., & Freire, M. M. (2017, May). CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility, and correctness. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) (pp. 400-406). IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Gap Analysis