Cloud Vulnerabilities: Understanding Risks and Implementing Strong Security Measures

Authors

  • Rishi Kumar School of Information Technology, London Metropolitan University Author
  • Anika Patel Department of Computer Science, University of Bolton Author

DOI:

https://doi.org/10.5281/

Keywords:

Cloud Computing, Cybersecurity, Risk Management, Data Protection, Insider Threats, Misconfigured Services, Data Breaches, Data Encryption.

Abstract

Cloud computing has transformed the IT landscape by offering scalable, flexible, and cost-effective solutions for data storage, processing, and deployment. However, the rapid adoption of cloud services has introduced a variety of risks, particularly related to cybersecurity and data protection. This paper explores the critical components of risk management in cloud computing, focusing on strategies to mitigate cyber threats and enhance data protection mechanisms. It discusses key risk factors, regulatory frameworks, and emerging best practices to help organizations adopt cloud technologies securely.

References

[1] H. K. Mistry, C. Mavani, A. Goswami, and R. Patel, "A Survey Visualization Systems For Network Security," Educational Administration: Theory and Practice, vol. 30, no. 7, pp. 805-812, 2024.

[2] E. Tuyishime, T. C. Balan, P. A. Cotfas, D. T. Cotfas, and A. Rekeraho, "Enhancing cloud security—proactive threat monitoring and detection using a siem-based approach," Applied Sciences, vol. 13, no. 22, p. 12359, 2023.

[3] H. K. Mistry, C. Mavani, A. Goswami, and R. Patel, "Artificial intelligence for networking," Educational Administration: Theory and Practice, vol. 30, no. 7, pp. 813-821, 2024.

[4] V. Singh and V. D. Kaushik, "Navigating the Landscape of Security Threat Analysis in Cloud Computing environments," in Security and Risk Analysis for Intelligent Cloud Computing: CRC Press, 2024, pp. 1-25.

[5] S. Ahmadi, "Cloud Security Metrics and Measurement," Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), vol. 2, no. 1, pp. 93-107, 2023.

[6] R. PUTRUS, "The Pivotal Role of AI in Navigating the Cybersecurity Landscape," ISACA Journal, no. 3, 2024.

[7] H. K. Mistry, C. Mavani, A. Goswami, and R. Patel, "The Impact Of Cloud Computing And Ai On Industry Dynamics And Competition," Educational Administration: Theory and Practice, vol. 30, no. 7, pp. 797-804, 2024.

[8] R. Al Nafea and M. A. Almaiah, "Cyber security threats in cloud: Literature review," in 2021 international conference on information technology (ICIT), 2021: IEEE, pp. 779-786.

[9] O. Ali, A. Shrestha, A. Chatfield, and P. Murray, "Assessing information security risks in the cloud: A case study of Australian local government authorities," Government Information Quarterly, vol. 37, no. 1, p. 101419, 2020.

[10] A. S. George and S. Sagayarajan, "Securing cloud application infrastructure: understanding the penetration testing challenges of IaaS, PaaS, and SaaS environments," Partners Universal International Research Journal, vol. 2, no. 1, pp. 24-34, 2023.

[11] R. Kumar and R. Goyal, "On cloud security requirements, threats, vulnerabilities and countermeasures: A survey," Computer Science Review, vol. 33, pp. 1-48, 2019.

[12] R. Patel, A. Goswami, H. K. Mistry, and C. Mavani, "Application Layer Security For Cloud," Educational Administration: Theory and Practice, vol. 30, no. 6, pp. 1193-1198, 2024.

[13] A. I. Tahirkheli et al., "A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges," Electronics, vol. 10, no. 15, p. 1811, 2021.

[14] A. Mishra, N. Gupta, and B. B. Gupta, "Security threats and recent countermeasures in cloud computing," in Modern principles, practices, and algorithms for cloud security: IGI Global, 2020, pp. 145-161.

[15] R. Patel, A. Goswami, H. K. K. Mistry, and C. Mavani, "Cognitive Computing For Decision Support Systems: Transforming Decision-Making Processes," Educational Administration: Theory and Practice, vol. 30, no. 6, pp. 1216-1221, 2024.

Downloads

Published

2024-10-11

Similar Articles

11-20 of 45

You may also start an advanced similarity search for this article.