CFP last date
20 December 2024
Reseach Article

Cloud Computing Security Issues and Countermeasure: A Comprehensive Survey

by Shaimaa Salama, Yasmin Alamoudi, Ghadeer Alamoudi, Farah Albeshri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 14
Year of Publication: 2023
Authors: Shaimaa Salama, Yasmin Alamoudi, Ghadeer Alamoudi, Farah Albeshri
10.5120/ijca2023922832

Shaimaa Salama, Yasmin Alamoudi, Ghadeer Alamoudi, Farah Albeshri . Cloud Computing Security Issues and Countermeasure: A Comprehensive Survey. International Journal of Computer Applications. 185, 14 ( Jun 2023), 54-61. DOI=10.5120/ijca2023922832

@article{ 10.5120/ijca2023922832,
author = { Shaimaa Salama, Yasmin Alamoudi, Ghadeer Alamoudi, Farah Albeshri },
title = { Cloud Computing Security Issues and Countermeasure: A Comprehensive Survey },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2023 },
volume = { 185 },
number = { 14 },
month = { Jun },
year = { 2023 },
issn = { 0975-8887 },
pages = { 54-61 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number14/32767-2023922832/ },
doi = { 10.5120/ijca2023922832 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:26:05.901501+05:30
%A Shaimaa Salama
%A Yasmin Alamoudi
%A Ghadeer Alamoudi
%A Farah Albeshri
%T Cloud Computing Security Issues and Countermeasure: A Comprehensive Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 14
%P 54-61
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has drawn attention in the current technological world due to its many benefits in contrast to traditional information technology (IT) infrastructure. Nowadays, many companies moved to the cloud instead of hosting computing resources internally in a privately owned cloud data center. As a result, the use of cloud computing has allowed companies to focus more on their business instead of developing and maintaining their own information technology (IT) equipment. In addition, cloud computing solves the limited resources problem; it intends to minimize the cost of services by sharing valuable resources which can be accessed remotely from anywhere among multiple users. Currently, organizations depend on cloud computing to effectively manage and store their data. However, storing organizational data raises many concerns and vulnerabilities; researchers have experimented with and used a variety of data protection and prevention strategies and techniques to reinforce the security barrier. However, gaps still need to be addressed by improving and strengthening these methods. This paper offers a survey of current relevant work that focuses on security concerns and protective measures in various aspects. These considerations must be taken into account when applying security to cloud computing infrastructure. Moreover, the paper proposes a new classification of the literature review following the CIA common model, which forms the basis for the systems security development.

References
  1. Rabi Prasad Padhy, Manas Ranjan Patra, and Suresh Chandra Satapathy. Cloud computing: security issues and research challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS), 1(2):136–146, 2011.
  2. Hayes Brian, Thomas Brunschwiler, Heinz Dill, Hanspeter Christ, Babak Falsafi, Markus Fischer, Stella Gatziu Grivas, Claudio Giovanoli, Roger Eric Gisi, Reto Gutmann, et al. Cloud computing. Communica- tions of the ACM, 51(7):9–11, 2008.
  3. Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, and Muhammad Ayaz. A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access, 9:57792–57807, 2021.
  4. Derrick Sampson and MD Minhaz Chowdhury. The growing security concerns of cloud computing. pages 050–055, 2021. doi:10.1109/EIT51626.2021.9491902.
  5. Aleksandr Ometov, Oliver Liombe Molua, Mikhail Komarov, and Jari Nurmi. A survey of security in cloud, edge, and fog computing. Sensors, 22(3):927, 2022.
  6. Waqas Ahmad, Aamir Rasool, Abdul Rehman Javed, Thar Baker, and Zunera Jalil. Cyber security in iot-based cloud computing: A comprehensive survey. Electronics, 11(1):16, 2021.
  7. Yunchuan Sun, Junsheng Zhang, Yongping Xiong, and Guangyu Zhu. Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7):190903, 2014.
  8. Yu-Hsin Hung. Investigating how the cloud computing transforms the development of industries. IEEE Access, 7:181505–181517, 2019.
  9. Peter Mell, Tim Grance, et al. The nist definition of cloud computing. 2011.
  10. Mohsen Attaran and Jeremy Woods. Cloud computing technology: improving small business performance using the internet. Journal of Small Business & Entrepreneurship, 31(6):495–519, 2019.
  11. Su Su Win and Mie Mie Su Thwin. Handling the hypervisor hijacking attacks on virtual cloud environment. In Advances in Biometrics, pages 25–50. Springer, 2019.
  12. Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. pages 217– 222, 2011.
  13. Sumant Ramgovind, Mariki M Eloff, and Elme Smith. The management of security in cloud computing. pages 1–7, 2010.
  14. V Sureshkumar and B Baranidharan. A study of the cloud se- curity attacks and threats. Journal of Physics: Conference Series, 1964(4):042061, jul 2021.
  15. Sandesh Achar. Cloud computing security for multi-cloud service providers: Controls and techniques in our modern threat landscape. 09 2022. doi:10.5281/zenodo.7084251.
  16. Amara Naseer, Huang Zhiqui, and Awais Ali. Cloud computing security threats and attacks with their mitigation techniques. pages 244–251, 10 2017. doi:10.1109/CyberC.2017.37.
  17. Te-Shun Chou. Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3):79, 2013.
  18. GS Sriram. Resolving security and data concerns in cloud computing by utilizing a decentralized cloud computing option. International Research Journal of Modernization in Engineering Technology and Science, 4(1):1269–1273, 2022.
  19. Said El Kafhali, Iman El Mir, and Mohamed Hanini. Security threats, defense mechanisms, challenges, and future directions in cloud comput- ing. Archives of Computational Methods in Engineering, 29(1):223–246, 2022.
  20. Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni- Hssane, and Cina Motamed. Cloud security and privacy model for providing secure cloud services. pages 81–86, 2016.
  21. Vinoth Dr, Hari Vemula, Dr Haralayya, Pradeep Mamgain, Mo- hammed Faez Hasan, and Mohd Naved. Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings, 51, 12 2021. doi:10.1016/j.matpr.2021.11.121.
  22. Sanjeev Kumar, Garima Karnani, Madhu Gaur, and Anju Mishra. Cloud security using hybrid cryptography algorithms. pages 599–604, 04 2021. doi:10.1109/ICIEM51511.2021.9445377.
  23. Chinnasamy Ponnusamy, S Padmavathi, and R Swathy. Efficient Data Security Using Hybrid Cryptography on Cloud Computing, pages 537– 547. 09 2020.
  24. TA Mohanaprakash and DV Nirmalrani. Exploration of various view- points in cloud computing security threats. Journal of Theoretical and Applied Information Technology, 99(5):1172–1183, 2021.
  25. Hossein Abroshan. A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography al- gorithms. International Journal of Advanced Computer Science and Applications, 12(6), 2021.
  26. Bijeta Seth, Surjeet Dalal, Vivek Jaglan, Dac-Nhuong Le, Senthilkumar Mohan, and Gautam Srivastava. Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecom- munications Technologies, 33(4):e4108, 2022.
  27. fortinet.com. Cia triad. 2010.
  28. Table 2: Summary of Existing Papers
  29. Reference
  30. Year
  31. Target
  32. Security Issues
  33. Countermeasures
  34. 
  35. Cloud computing security for multi-cloud services providers: Controls and techniques in our modern threat
  36. 2022
  37. Cloud security include (identity and access management, data at rest and in transit, egress and ingress traffic control)
  38. - Data loss or theft.
  39. - impact on protect data at rest
  40. - using identity and access management (IAM).
  41. 
  42. 
  43. 
  44. 
  45. 
  46. -Data encryption (protect data at rest)
  47. 
  48. 
  49. 
  50. 
  51. 
  52. - Access control
  53. 
  54. Resolve Security and Data Concerns in cloud computing-
  55. ing by utilizing a
  56. decentralized cloud
  57. computing option
  58. 2022
  59. Cloud computing security in-
  60. clude cybersecurity attacks,
  61. data privacy and integrity,
  62. and cloud computing infras-
  63. tructure stability vulnerable
  64. target (e.g. schools, hospitals,
  65. hospices)
  66. -Phishing
  67. -Ransomware
  68. -Trojan
  69. -Botnet
  70. -Distributed Denial of Service
  71. -Adware
  72. -Crypto mining
  73. - Data encryption methods known as Ried
  74. Solomon erasure coding
  75. - Geo-redundancy for data integrity
  76. 
  77. 
  78. 
  79. 
  80. 
  81. 
  82. 
  83. 
  84. 
  85. 
  86. 
  87. 
  88. 
  89. 
  90. 
  91. 
  92. 
  93. 
  94. 
  95. Cloud Security us-
  96. ing Hybrid Cryptog-
  97. raphy Algorithms
  98. 2021
  99. Increases cloud storage secu-
  100. rity using hybrid algorithms
  101. -Data Integrity -Data Avail-
  102. ability -Data Confidentiality -
  103. Denial Of Service -Data Loca-
  104. tion -Data Breach -Data Loss
  105. -Digital Signatures -Data Encryption -Intrusion
  106. Detection System (IDS)
  107. 
  108. 
  109. 
  110. 
  111. 
  112. 
  113. 
  114. Efficient data Secu-
  115. rity using hybrid
  116. cryptography on
  117. cloud computing
  118. 2021
  119. Increases security and confi-
  120. dentiality of patient data in
  121. cloud storage
  122. Data confidentiality
  123. A hybrid cryptosystem
  124. 
  125. 
  126. 
  127. 
  128. 
  129. 
  130. 
  131. 
  132. 
  133. 
  134. 
  135. 
  136. 
  137. Security threats,
  138. defense mechanisms, challenges, and Future directions in cloud
  139. computing
  140. 2021
  141. - Provide a full cloud com-
  142. puting fundamentals review -
  143. Discuss the major security is-
  144. sues and defence techniques.
  145. -Summarizing and compare
  146. the literature
  147. Data breaches, data loss, ac-
  148. count or service traffic hijack-
  149. ing, insecure interfaces and
  150. API, denial of service, mali-
  151. cious insiders, insufficient due
  152. diligence, shared technology
  153. vulnerabilities, loss of gover-
  154. nance, availability chain, and
  155. insecure or incomplete data
  156. deletion.
  157. For DDoS attack: - Defence deployment:
  158. Source-End Deployment, access Point deploy-
  159. ment, Intermediate-network deployment, and distributed defense. - Defence detection: source
  160. and spoof trace, or based on signature/patten,
  161. hybrid, anomaly mechanisms, count based filtering, resource usage, and BotCloud.
  162. 
  163. Application of cloud computing in banking and e-commerce and related security threats
  164. 2021
  165. Examines several cloud computing applications in e-commerce and banking as well as the related security challenges
  166. -Multi tenancy
  167. - Semantic gap
  168. - Trust
  169. - Loss of control
  170. Proper planning and understanding of emerging risks, threats, vulnerabilities and potential solutions are necessary
  171. 
  172. Explosion of various viewpoint in cloud computing security threats
  173. 2021
  174. Data security, Network security, Environmental and Virtualization issues
  175. -Malicious attacks
  176. Data -Data Breach -Data loss
  177. -Impact on data integrity - Data Seizure -Storage compatibility issue
  178. Network -Denial of service - Man in the middle attack - Packet sniffing Environment - Inside user (hacker) -Misused of cloud assists Virtualization -Impact on (VM cache, migration , and cloning)
  179. Use hashing algorithms: - Message digest 5(MD5) - Secure hashing algorithm (SHA) - Use cryptographic methodology
  180. 
  181. A Hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms
  182. 2021
  183. Improve Cloud computing security with minimal impact on performance
  184. -Impact on data integrity
  185. Improved Blowfish algorithm with an elliptic curve-based algorithm
  186. 
  187. A Study of the cloud security attacks and threats
  188. 2020
  189. Cloud-related protection challenges and risks
  190. Secrecy, authenticity, honesty,
  191. availability, and auditability
  192. Intrusion detection mechanisms, cryptographic
  193. methodology electronic forensic software
  194. 
  195. Integrating encryption
  196. techniques for
  197. secure data storage
  198. in the cloud
  199. 2020
  200. Increases security by providing
  201. a novel two-tier cloud
  202. computing architecture (HB-
  203. DaSeC) that indicates security
  204. storage, verification, and
  205. auditing.
  206. -Information leaks -
  207. Confidentiality and privacy
  208. issues
  209. HBDaSeC: applied Data fragmentation, dual
  210. encryption techniques
  211. 
  212. Cloud computing
  213. security threats
  214. and attacks with
  215. their mitigation
  216. techniques
  217. 2017
  218. Categorize security attacks in
  219. terms of the cloud services
  220. they affect and the network
  221. layers where they reside
  222. - CIaaS, PaaS, SaaS -Data
  223. breach -Data loss -Account or
  224. service hijacking -Insecure in-
  225. terfaces and APIs -Malicious
  226. insiders -Insufficient due dili-
  227. gence -Unknown risk profile
  228. Identity theft -Changes to
  229. business odel -Lock-IN
  230. - IaaS, PaaS,abusive use
  231. of cloud services
  232. - IaaS Shared technology is-
  233. sues
  234. Backup -Encryption -Protect data in transit -
  235. Strong key generation, storage and management
  236. -Strong API -Understanding of security polices -
  237. Strong Authentications -Using strong authoriza-
  238. tion and authentication. -Properly auditing net-
  239. work traffic. - credit card fraud monitoring -
  240. Using better authentication and access control
  241. mechanisms.
  242. • -Inspect vulnerabilities and configuration. -Monitor environment for unauthorized changes/activities
  243. - Use of SLA for patch-
  244. ing and vulnerability remediation.
  245. 
  246. Cloud security and
  247. privacy model for providing secure cloud services
  248. 2016
  249. Provide cloud security and
  250. privacy model (CSPM) to in- crease security and customer trust also help orgnization to identify the security issues
  251. -Insider attacks -Cloud
  252. malware injection attacks
  253. -Cryptographic attacks - Account and service hijacking attacks.
  254. Deploy intrusion detection system or/an intrusion prevention system for each CSPM layer. -Cryptographic techniques, including symmetric-key, asymmetric-key -Homomorphic encryption techniques -Control and manage- ment techniques, such as attribute-based en- cryption (ABE), key policy attribute based encryption, and cipher text policy attribute-based encryption
  255. 
  256. Security threats on
  257. cloud computing vulnerabilities
  258. 2013
  259. Cloud security risks and
  260. threats based on the nature of the cloud service models
  261. Distributed denial of service
  262. (DDoS) attacks - Data loss
  263. Malicious programs (virus and Trojan, and brute force attack) -Malicious insider - Online cyber theft - Malware injection attack -Wrapping attack
  264. Security policy enhancement - Access management by using authentication standards security (SAML) and (XACML)
  265. 
  266. Emerging security
  267. challenges in cloud
  268. computing: An
  269. insight to cloud
  270. security challenges
  271. and their mitigation
  272. 2011
  273. Discuss major cloud comput-
  274. ing security issues and defense
  275. mechanisms
  276. Insider threats
  277. Outside malicious attacks
  278. Multitenancy issues
  279. Loss of control.
  280. Defense-in-depth approach
  281. Multi-layer security approach
  282. 
  283. The Management Of
  284. Security In Cloud
  285. Computing
  286. 2010
  287. Deliver strategic direction for
  288. the implementation of a se-
  289. cure cloud system. - Discuss
  290. security perspectives require-
  291. ment, and issues
  292. -privileged access
  293. -Regulatory compliance
  294. -Data location
  295. -Data segregation
  296. -Data recovery,
  297. -Investigative support
  298. -Long-term availability
  299. -Data availability
  300. -Modifying and combining data security and pri-
  301. vacy regulations
  302. -Constructing a holistic view of cloud computing
  303. rules
  304. 
  305. 
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Services Resources Security Issues Countermeasure Data Storage