CLOUD COMPUTING SECURITY
EOI: 10.11242/viva-tech.01.08.063
Citation
Brijesh Joshi, Yogesh Patil , " CLOUD COMPUTING SECURITY", VIVA-IJRI Volume 1, Issue 8, Article 1, pp. 1-9, 2025. Published by MCA Department, VIVA Institute of Technology, Virar, India.
Abstract
"Cloud computing has become a cornerstone of modern IT infrastructure, offering scalable and cost-effective solutions for businesses worldwide. However, the rapid adoption of cloud services has introduced significant security challenges that must be addressed to ensure the confidentiality, integrity, and availability of data. This paper explores the key security issues in cloud computing, including data breaches, insider threats, service disruptions, and compliance with regulatory requirements. It discusses various security models and techniques, such as encryption, identity and access management (IAM), and continuous monitoring, that are critical to safeguarding cloud environments. Additionally, emerging threats like quantum computing and AI-driven attacks are considered, highlighting the evolving nature of cloud security. Finally, the paper emphasizes the importance of a collaborative approach between cloud service providers and users to enhance security and mitigate risks, ultimately ensuring the reliability and safety of cloud-based solutions.
Keywords
Automation, connectivity disruptions, diagnostic tools, network performance, network troubleshootingCloud Computing, Cloud Deployment Models, Computing Industry, Distributed Architecture, ServerResources
References
- Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risk and Compliance. O'Reilly Media, Inc.
- Ohlman, J., Eriksson, H., &Rembarz, K. (2009). "Cloud Computing Security Issues and Challenges: A Survey." International Journal of Computer Applications, 2(7), 32-39. https://doi.org/10.5120/2770-3921
- Zissis, D., & Lekkas, D. (2012). "Addressing cloud computing security issues." Future Generation Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future.2011.05.020
- Chand, S., & Ghai, S. (2012). "Cloud computing security issues and challenges: A survey." International Journal of Computer Applications, 40(3), 19-24. https://doi.org/10.5120/6353-8856
- Sultan, N. (2013). "Cloud computing for education and learning: Education technology revolution." International Journal of Information Management, 33(2), 281-285. https://doi.org/10.1016/j.ijinfomgt.2012.11.008
- Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud Computing: Implementation, Management, and Security. CRC Press.
- Chen, H., Paxson, V., & Katz, R. H. (2010). "What is the cloud?" Proceedings of the ACM SIGCOMM 2010 Conference, 51-58. https://doi.org/10.1145/1851182.1851192
- Zhang, J., Cheng, L., &Boutaba, R. (2010). "Cloud computing: State-of-the-art and research challenges." Journal of Internet Services and Applications, 1(1), 7-18. https://doi.org/10.1007/s13174-010-0007-6
- Wang, L., & Wang, X. (2013). "A survey of cloud computing security issues and solutions." International Journal of Cloud Computing and Services Science (IJCCSS), 2(2), 1-12.
- Garg, S. K., Versteeg, S., &Buyya, R. (2013). "A survey of cloud computing pricing models." International Journal of Cloud Computing and Services Science (IJCCSS), 2(1), 1-11. https://doi.org/10.5121/ijccss.2013.2101
- Sahai, A., & Srinivasan, V. (2011). "Cloud computing: Security issues and challenges." Proceedings of the International Conference on Information and Communication Technologies, 1-8.
- Curran, K., & Carlin, S. (2011). "Cloud Computing Security." International Journal of Ambient Computing and Intelligence, 3(1), 14-19. https://doi.org/10.4018/jaci.2011010102
- Marinescu, D. C. (2017). Cloud Computing: Theory and Practice. Elsevier
- Marinescu, D. C. (2017). Cloud Computing: Theory and Practice. Elsevier
- Chong, F., & Carraro, G. (2006). "Architecture strategies for capturing cloud computing." Microsoft Technical Report, 1-14.
