A Review on Security Challenges and Approaches in the Cloud Computing

被引:0
|
作者
Alsaadi, Elham Mohammed Thabit A. [1 ]
Fayadh, Sabah Mohammed [2 ]
Alabaichi, Ashwak [3 ]
机构
[1] Univ Kerbala, Coll Sci, Dept Comp Sci, Karbala, Iraq
[2] Southern Tech Univ, AL Nassrivah Tech Inst, Dept Comp Syst, Thi Qar, Iraq
[3] Univ Kerbala, Coll Engn, Dept Biomed Engn, Karbala, Iraq
关键词
Virtualization; Data security; Cloud computing; Cloud Security; security vulnerabilities; attacks; SCHEDULING ALGORITHM; ISSUES;
D O I
10.1063/5.0027460
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud Computing is a model based on computing system which provides convenient and customizable services to the users for accessing to different cloud applications. It provides a way for storing and accessing cloud data from anywhere via connecting the cloud application utilizing interact. The cloud computing and its related safety problems is one of widely discussed concerns in today generation's research field. While numerous cloud security investigations are previously widespread, there residues a definite distance in properly identifying these issues and find the appropriate solutions. Some studies discuss the problems of virtualization and approach the target, while others talk about access control mechanisms, but what's missing is a standard framework which simultaneously extends the concept of cloud security and describes its specific requirements. In addition, countermeasures given in a survey must clearly illustrate the problem it deals with. This analysis paper took all of these elements into consideration so that the necessary areas were properly connected and a number of open issues were discussed in this area. This paper also reviews the most significant security techniques to data protection and cloud security in the cloud computing. Moreover, security techniques for data protection will be recommended in order to have enhanced security in cloud computing. It will concentrate primarily on issues related to data security and provides solutions.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Major Cloud Computing Security Challenges with Innovative Approaches
    AlSelami, Fudhah A.
    [J]. TEHNICKI GLASNIK-TECHNICAL JOURNAL, 2023, 17 (01): : 141 - 145
  • [2] Cloud computing security issues & challenges: A Review
    Mondal, Avijit
    Paul, Subrata
    Goswami, Radha Tamal
    Nath, Sayan
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 159 - +
  • [3] A Review on Different Security Issues and Challenges in Cloud Computing
    Narang, Ashima
    Gupta, Deepali
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 121 - 125
  • [4] Security Issues and Challenges in Cloud Computing: A Mirror Review
    Kumari, Chandini
    Singh, Gagandeep
    Singh, Gursharan
    Batth, Ranbir Singh
    [J]. PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 702 - 707
  • [5] Security in Cloud Computing Systems A Review of Challenges and Solutions for Security in Distributed Computing Environments
    Srivastava, Stuti
    Sudhish, Prem Sewak
    [J]. PROCEEDINGS OF THE 2015 39TH NATIONAL SYSTEMS CONFERENCE (NSC), 2015,
  • [6] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    [J]. 2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [7] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [8] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    [J]. PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [9] A Review in Security Issues and Challenges on Mobile Cloud Computing (MCC)
    Muhseen, Shirin Abdul S.
    Elameer, Amer S.
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 133 - 139
  • [10] A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges
    Kene, Snehal G.
    Theng, Deepti P.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 227 - 232