ArticlePDF Available

A Survey on Cloud Security: Concepts, Types, Limitations, and Challenges

Authors:

Abstract and Figures

Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current cloud computing systems. Finally, we present a variety of security threats targeting and addressing cloud storage services. In particular, we raise awareness on security issues that cloud organizations including cloud service providers, data owners and cloud users face and address them.
Content may be subject to copyright.
Vol. 03, No. 02, pp. 47 58 (2022)
ISSN: 2708-0757
JOURNAL OF APPLIED SCIENCE AND TECHNOLOGY TRENDS
www.jastt.org
doi:10.38094/jastt301137 47
A Survey on Cloud Security: Concepts, Types, Limitations,
and Challenges
Marya Ayoub Omer1*, Abdulmajeed Adil Yazdeen1, Hayfaa Subhi Malallah1, Lozan Mohammed Abdulrahman1
1ITM Dept., Technical College of Administration, Duhok Polytechnic University, Duhok, Iraq, (mariaayob997@gmail.com
abdulmajeed.adil@dpu.edu.krd, hayfaa.subhi@dpu.edu.krd, lozan.abdulrahman@dpu.edu.krd)
*Corresponding Author mariaayob997@gmail.com
Abstract
Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from
home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote
access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks
on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are
still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations
proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified
security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current
cloud computing systems. Finally, we present a variety of security threats targeting and addressing cloud storage services. In particular,
we raise awareness on security issues that cloud organizations including cloud service providers, data owners and cloud users face and
address them.
KeywordsCloud computing, Security, Data security, cloud services limitation, SaaS, PaaS, IaaS.
Received: October 05, 2022 / Accepted: December 27, 2022 / Online: December 29, 2022
_________________________________________________________________________________________________________
I. INTRODUCTION
The exponential rise of global data sets has posed a
dilemma for the information technology sector. The white book
Data-Age 2025 published by International Data Corporation
forecasts that the world's data universe will more than triple
from 33 zettabytes in 2018 to 175 zettabytes by the year 2025.
In the next years, it is anticipated that the market for cloud
computing would expand at a rapid rate. One solution to the
challenges caused by the increase of data is cloud storage,
which makes use of a network that is connected to several data
centers in order to combine multiple storage devices into a
single storage pool. Cloud storage enables users to store data,
exchange it with other users, and access it at any time and from
any place by using a computer that is linked to a network, most
often the Internet [1].
When referring to a technique of storing and accessing data
through the Internet rather than on a local server, the phrase
"cloud computing" is used.
Customers stand to gain a number of exciting benefits as a
result of the company owners' decision to move their
operations into the cloud. These benefits include scalability,
resilience, high performance, on-demand, and a Pay-Per-Use
service model. However, when services are outsourced to other
parties, there is an increased risk of data breaches, data loss,
and service denial.
A number of well-known cloud storage alternatives,
including OpenStack Swift, Ceph, Dropbox, Google Drive, and
Microsoft OneDrive, have been put into us. As a direct
consequence of this, the most important issue facing the cloud
computing business in the present day is one of data security.
Customers rely on CSPs to protect the information they
provide, the services they provide, and the availability of those
services, as well as to demonstrate that they comply with all
applicable security standards [2].
Evaluating the security of a CSP is a difficult process
because of the intangible nature of the component. Since of
this, the process of adopting cloud computing is sped up
because customers are better able to make informed judgments
based on reliable and consistent information about the security
of the services they are contemplating using. This in turn
speeds up the adoption process. A Security Service Level
Agreement (also known as a Security SLA) is currently being
drafted by security service providers and their customers in
order to control the nature of their relationship with regard to
the management of security [3]. Within this document, the
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
48
rights of each party are safeguarded, and each party is required
to collaborate with the other parties in order to avoid security
breaches and the accompanying financial and technical
penalties. As a result of the notion of cloud computing, cloud
service providers (CSPs) are confronted with a myriad of
challenges, some of the most significant of which include
output guarantee, resource restrictions, disaster recovery
planning, regional workload distribution, and regulatory
considerations. As a potential solution to these issues, the idea
of a cloud federation was conceived as a possible solution. It
makes it possible for a CSP to keep complete control and
visibility over the processing of a portion of the requests made
by its users while delegating those requests to third-party
service providers [4].
The remainder of this paper is structured as follows: section II
discussed types of cloud. In section III, the concept of the
cloud services model is outlined. Section IV depicts cloud
service model limitations. Cloud security issues and challenges
are presented in section V Section VI presents the literature
review. Section VII presented discussion and comparison, and
section VIII concludes the paper.
II. CLOUD TYPES
Private Cloud: it is restricted and open to a small
community of people and organizations. This cloud model
provides more protection and resource management.
Public Cloud: every subscriber is allowed to access the
cloud via public cloud internet connectivity. The public or
organizations therefore manage public cloud resources.
This cloud type contains little control of resources and less
privacy [5, 6] .
Community Cloud: this type of cloud shares more than
two cloud-like organizations. A third party or company
manages it. It offers services to large users compared to
the private cloud, providing more protection than the
public cloud[7].
Hybrid Cloud: Companies that use a hybrid cloud model
make use of both private and public cloud resources. A
company uses private cloud resources for routine
operations but uses public cloud resources for scalability
and cost-effectiveness [8].
There is a distinction between cloud computing service models,
which is illustrated in Table 1.
TABLE 1: Comparison of Cloud Computing Service Model [5].
III. CLOUD SERVICES MODEL
Cloud services fall into three categories as shown in Figure 1:
a) Software as a Service (SaaS): This model provides cloud
customers with a variety of applications for a variety of
operations. Web Browsers are used by users to access the
applications. They just charge based on the number of times
a program, such as Microsoft Word, Notepad, or Paint, is
used. Google, ZOHO, Intuit, and Salesforce.com are all
examples of SaaS providers [9].
b) Platform as a Service (PaaS): This model Platform-like
Operating System provides services to users. Users create
their own frameworks and work with an Integrated
Development Environment (IDE) that includes a compiler,
editor, and other tools. PaaS providers include Google Apps,
Force.com, and Bungee Connect [10].
c) Infrastructure as a Service (IaaS): This model provides cloud
users with infrastructures such as storage, networks, and
servers as a service. Consumers use these programs based on
their own requirements, paying only for what they use. The
user manages the operating system and the program's
deployment but does not manage or track the cloud
environment. IaaS services include Amazon Elastic Compute
Cloud (EC2) and EMC Atmos [11].
Model
Scope
Managed
by
Security
Level
Disadvan
tages
Public
Model
Public and
private
sectors
Providers
of cloud
services
Low
Can be
unreliable
Less
secure
Privat
e
Model
Single
organizatio
n
Single
organizati
on
High
More
costly
Requires
IT
expertise
Comm
unity
Model
Organizatio
ns with
common
strategies
and
reservations
about
protection
Many
organizati
ons or
cloud
service
providers
High
costly
than the
public
cloud
Hybri
d
Model
Public and
organizatio
n
Public and
organizati
on
Medium
Potential
challenges
in
applicatio
n and data
integratio
n
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
49
Fig 1. Cloud services [12].
IV. CLOUD SERVICE MODEL LIMITATIONS
A. Limitations in SaaS
Data localization and data integrity are two significant limits
that may have an effect on the adoption of software as a service
(SaaS) applications. The majority of the time, the customer is
unaware of the location at which the service provider maintains
its data or the measures that must be taken to protect it from
unwanted modifications. The lack of trust that exists between
cloud customers and cloud providers is one of the most
significant issues that arises with software as a service [13].
In order to protect sensitive student information, the IT
department of the university may decide to host the SaaS
application on a dedicated server or to make use of the
infrastructure services offered by reputable third-party vendors
such as Google, Amazon, and others. Both of these options are
available to the university. These criteria explain why the
majority of the high schools that participated in our study
choose to use private clouds rather than public or hybrid ones
(Figure 2).
Fig 2: Surveyed Institutions' Use Of Cloud Models [14].
B. Limitations in PaaS
Software developers working for educational institutions may
be able to develop and move SaaS applications to the cloud in
a more expedient manner by using a platform known as PaaS.
Nevertheless, working with PaaS services might provide
developers with a number of obstacles to overcome. To begin,
increasing capability makes it simpler for developers to
integrate and manage cloud-based apps provided by other
parties. Users of PaaS have yet another significant challenge
in the form of being constrained to certain programming
paradigms or tiers of service providers. Before being moved to
a new PaaS environment, these models and services need to
undergo a comprehensive redesign. This is necessary since
they are highly dependent on their current setting. Users are
unable to switch networks since they are restricted to the one
they are currently using. On top of the platform, developers
may build and maintain their apps, but they have no clue about
the security that the platform's service provider has permitted
below the platform [15].
C. Limitations in IaaS
IaaS provides its customers with a higher level of security-
related agency as compared to the previous two service
categories. When selecting a source, the reliability of the
information that the source provides is the single most
important consideration to make. In the model of
infrastructure as a service (IaaS), security is shared
responsibility between service providers and end users.
Because of the supplier's obligation, stringent safeguards have
to be taken to secure both the physical and the digital
surroundings. On the other hand, it is the responsibility of the
cloud client to guarantee the safety of their own data,
applications, and operating system. The model known as
Infrastructure as a Service places a significant emphasis on
virtualization. In a scenario that makes use of virtualization,
the possibility of a cross-tenant attack exists whenever several
tenants use the same physical infrastructure. In this scenario,
an attacker must first get root access in order to access the
cloud accounts of the majority of tenants [16] .
V. CLOUD SECURITY ISSUES AND CHALLENGES
The use of cloud computing has made some tasks simpler to
do, but it has also raised new safety issues. As a result of the
fact that various types of data are dispersed throughout the
network and stored in a variety of cloud services, there are
probably a great many distinct vulnerabilities that may be
taken advantage of by bad actors. The five various ways in
which a cloud environment could be safe are shown for us in
Figure 3 : in terms of security rules, data security, user-
oriented security, network security, and application security
[17].
A. Security policies
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
50
The goal of security policies is to lay out the procedures that
should be followed in order to protect a system from being
compromised in some way. The implementation of these
standards will hopefully result in a cloud workspace that can
be relied upon and is safe. It is possible for a variety of
circumstances, such as regulatory authorities, service level
agreements (SLAs), client management challenges, and
established trust, to have an effect on security policies [18] .
Service-level agreement (SLA)
In each of these client-service provider interactions, the
Service Level Agreement (SLA) is applicable. SLAs are
necessary for suppliers that wish to keep their customers'
expectations in control and are required to meet those
expectations. Service providers, on the other hand, are often
shielded from liability under the provisions of service level
agreements in the event of errors or results that are below par
(SLAs) [19]. Another factor that should be considered when
assessing the quality of a service is the use of service level
agreements, or SLAs . On the other hand, SLA is unable to
guarantee assurance for a specific method. To restate, the SLA
does not promise outstanding service and cannot enhance the
quality of delivery that is below standard. The SLA includes a
statement of concerns as well as a list of resources that are
considered to be within its jurisdiction. In addition to this, it
specifies the duties that the service provider must fulfill as
well as the responsibilities that the customer must fulfill. The
Service Level Agreement (SLA) [20] details the measures for
performance, availability, usage, and reaction time.
Antecedent trust
Establishing mutual trust is one of the most important first
steps in any business collaboration. As a direct consequence of
this, cloud computing is still having trouble overcoming these
challenges [21].
B. User-oriented security
Because of the complexity of utilizing cloud storage, it is
necessary to have strong security that is user-oriented in order
to safeguard data and resources. Cloud service providers
monitoring user-submitted data while it is being stored and
processed is a huge security risk. The capacity to identify,
verify, authorize, and deal with access concerns are all
included in this aspect of security's capabilities[22].
Fig 3. Different types of cloud security issues [18]
Authentication
With cloud computing, organizations are able to store a
greater volume of data at a lower cost. For this reason, the
news that service providers are permitted to adopt creative
ways of customer verification comes as a welcome relief.
Depending on their needs, machines may either conduct
complete or partial authentication. In the context of cloud
computing, a fundamental authentication method will not let
you to access data from a variety of cloud service providers.
Access for privileged users may be granted even if doing so
carries some inherent danger. Nevertheless, this problem may
be solved by using any one of a number of other
authentication processes. It is common for users to be granted
dedicate access authority when they provide information only
they are aware of, such as a card number or a password they
have created themselves. The following are the two primary
classifications that these techniques belong to: The two most
important types of security verification are known as physical
authentication and digital authentication[20].
Authorization
The component of information security known as
"authorization" is responsible for deciding whether or not to
comply with a user's request to get access to a certain
resource. An administrator of the system functions as a liaison
between the users of the system and the system itself [5]ageed.
Because the cloud is a distributed computing environment, a
single client may make use of services offered by a number of
distinct providers, each of which may use a security approach
that is slightly unlike to the others. For instance, when the user
has given authorization to the program, the application may
then be available from the outside world. In this context, one
Cloud security issues
classification
Security
policies
User-oriented
security
Data
storage
Applicatio
n
Network
Service level
agreement
Client
management
issue
Antecedent
trust
Authentication
Authorization
Identity and
access
management
Data
warehou
se
CIA Tired
Malware
Meta
data
Operating
systems
Front end/
Backend
Application
vulnerabilities
Intrusion
prevention
system
Intrusion
detection
system
Firewalls
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
51
may make use of either access management rules or access
delegate credentials. Authorized users are the only ones who
are able to manage and make use of available services and
resources [21].
One of the advantages of a centralized access system is that it
protects sensitive data while also eliminating a number of
management and security processes. Another advantage is that
it saves time. The MAC, DAC, RBAC, and ABAC are only a
few examples of several kinds of authorization systems [23].
Identity and access management
Identity and access management, which is a policy-based
framework for controlling digital identity inside an
organization, is one of the most well-supported approaches to
identify identity management capabilities. This is because
identity and access management is a framework. Identity
access management systems are required to take all necessary
steps in order to ensure the security of user credentials during
storage and recording, as well as to prevent unauthorized
access to this information.
Manage the access that users have to the corporate database
and make adjustments as required. The identity and access
management system acts as a directory that is accessible
throughout the whole organization and takes into
consideration the many different categories of users that the
firm has. Nevertheless, as of just this moment, neither
productivity nor income are being negatively impacted by the
identity and access control system. As a direct consequence of
this, it is very difficult to get financial support for these
endeavors. The current state of identity and access
management in the business world, on the other hand, poses a
risk to both corporate compliance and overall security [24].
C. Data storage
The data associated with the logical pool is stored in a digital
archive that is hosted in the cloud. The information is
physically kept on a large number of servers, each of which is
operated and maintained by a distinct web hosting provider.
As more and more people use the internet and many other
connected devices, there is an increasing need for distributed
computing systems to store data in a manner that is both safe
and accessible. Concerns over storage, availability,
confidentiality, the CIA, and other sorts of security have
surfaced as a direct consequence of difficulties with data
management. It is the responsibility of the cloud service
provider to ensure that the data are always accessible [25].
CIA tired in data security
When it comes to cloud computing, the three most pressing
concerns are accessibility, honesty, and privacy. (CIA) The
ACID property should be adhered to by any and all data that is
kept in the cloud in order to provide both privacy and
transparency. Cloud service providers recognize that high
availability is beneficial not just to them but also to the
customers they serve [5]. The dependability of a service may
be jeopardized by a variety of factors, including hardware
failures, software defects, and aggressive attacks from the
outside. OneDrive, the cloud storage service offered by
Microsoft, does not provide any type of encryption for the
private data stored by its customers, in contrast to both
Dropbox and Google Drive [26].
Metadata
A collection of files constitutes metadata in its most basic
form. The use of cloud computing has increased in popularity,
which has resulted in a considerable expansion of the
significance and complexity of metadata. Metadata now stores
sensitive data. What was done, where it was done, the flee
style, the data format, and other types of information are
examples of the sorts of information that may be found in
metadata. Metadata may also include information on the
format of the data. Cybercriminals are able to access the
information that is saved in metadata, which has a tremendous
deal of value. On the other hand, corporations make use of
metadata data to extract more monetary value from their
already-existing data. In addition, given that metadata might
include confidential and private information, it is of the utmost
importance to protect metadata using appropriate encryption
technology. Unfortunately, only records of massages may be
encrypted; this means that any information about touches will
still be exposed. The use of Virtual Private Networks (VPNs)
makes it simple to prevent unauthorized access to the type of
sensitive data that is being discussed here [5].
D. Application security
Vulnerabilities in application security are one of the most
significant challenges posed by cloud computing in terms of
data protection. Before developing any software applications,
there are a number of security considerations associated with
the creation of cloud apps and networking that need to be
taken into consideration. The trust mechanism is of the utmost
importance when it comes to the provision of web-based
business services that are secure. OWASP's core area of focus
is the security of back-end components of web applications
[27].
Mobile apps have long been one of the most popular ways to
interact with the Internet, but web application vulnerability
security has had many drawbacks. Hackers do, in reality, use
endpoint-sent-traffic to inject malicious executable codes. It's
referred to as code injection. Malicious code can also be used
in cross-site scripting. Scripts are differentiated. Web apps are
vulnerable to threshold, exception, and password
programming. Configuration or incomplete changes are often
the result of management issues. Make special programming
languages more difficult. Protecting web applications also
adds to the complexity of other issues, such as Internet
security. OSs are also crucial in application cloud protection,
application program, and related OS. Indeed, as a computer
program, the operating system is responsible for managing
and monitoring all resources (hard drives, memory, screens,
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
52
and so on) that are used to run and exchange multiple
applications at the same time [28].
E. Network
Since cloud computing is basically network-based, serious
security concerns arose. The key parallels between network
security and cloud security are emerging data protection,
network security, and the information security sub-area. Many
real-world security problems confront networks. Using data
and cloud technology protections and services, network
administrators will need to follow acceptable security policies
[29].
Unfortunately, connectivity problems including denial of
service (DoS), distributed denial of service (DDoS), flooding
attacks, and network protocol vulnerabilities emerged. The
easiest way to prevent attacks is to use firewalls. End-users,
servers, and cyberspace routers are also subject to data
security audits in the cloud. Traditional firewalls are
equivalent to firewalls-as-a-service. Since the service is hosted
in the cloud, it is available on any network[30].
FWaaS is a good choice for any security network enterprise
because it is less expensive, more powerful, and more flexible
than traditional firewalls. Firewalls aren't ideal for preventing
cloud service attacks, but they do help to limit vulnerabilities
and divisions. Simply put, a firewall can prevent backdoor
Trojans from entering, but it cannot eliminate viruses, worms,
or malware. A firewall must communicate; a firewall only
examines packet headers when malicious network access is
detected and logged; protocol sorting, protected address,
destination address, and secure port policy are all things that a
firewall must consider. IDS seeks to gather valuable data for
future safety assessments in addition to avoiding attacks. IPS
stands for "unnecessary network access." IPS helps to prevent
intrusion or ransomware in addition to detecting and tracking
risks. Finally, keep in mind the broader sense of network
security. Additional articles [31].
VI. LITERATURES REVIEW
[21] reveal some cloud benefits in the education sector and
highlight certain cloud disadvantages. Services, as well as
security issues When using cloud technologies, companies
face many challenges. Any educational institutions conducted
the survey. Investigating stakeholders' cloud security
viewpoints Vulnerabilities and overcoming methods, the
author proposed as a starting point. When using the cloud,
stop all potential security risks. Computing in high-school
institutions. Reviews by the author the conclusions and
discusses them. Via a survey conducted at several universities
that switched to cloud computing Collecting this material. The
methodology is used to identify stakeholders' views on cloud
security vulnerabilities and tactics to overcome them at
colleges and Students of universities, faculty members
Students and IT workers filled out the questionnaire. It is
approximately 64% of universities were found cloud-based.
Just 36% are cloud service providers, however. Even a
supplier Looking at the responses to the questionnaire, we
noticed something. That several respondents are uninitiated
when it comes to privacy risks to their cloud or protection
measures in place Avoid at any expense. This means
responsibility on those responsible for cloud computing.
Stakeholders are not updated on computing security issues
related to their cloud computing.
[27] Suggested The multi-workflow QoS Controlled
Scheduling approach fulfills the various QoS goals of the
client, such as execution time, cost, and ongoing work
planning. They focus only on cost or time, or both in
unchanged quality and accessibility. This number meets
various service quality, such as time, costs, and consistency
and transparency. This proposed diagram satisfies various
service quality aspects, including time, cost, accuracy, and
transparency. As a result, planning is performed in one target
for the basic QoS specifications of a client.
[32] Covered cloud computing and mobile cloud computing,
combining cloud computing with IoT, and how cloud
convergence supports mobile apps. Integrating cloud
computing for mobile devices and IoT leads to many
vulnerabilities in encryption and security compromises. The
authors concentrated primarily on mobile cloud IoT
integration security issues and numerous factors affecting
mobile cloud IoT security's normal functioning. The various
security issues in this field and the various factors affecting
security in this area were also discussed, and how they can be
managed to provide IoT-enabled service for efficient and
natural mobile cloud computing. And grouped security
problems into three types: architectural, infrastructural,
privacy, and compliance issues. Some preventive measures
suggested by various mobile cloud computing researchers
based on different mobile cloud computing areas were also
discussed.
[33] Established key architectural elements of SDCC. The key
motivation is achieving agreement within the research
community and promoting the SDE concept in cloud
environments. Many suppliers actively create SDCC products
and specifications. This will benefit ultra-large service
providers (e.g., Google, Yahoo, and Amazon). SDCC
concepts promote innovation in many fields including
physical hardware, network management and legacy networks,
and technology bridging elements. Authors strongly believe
that SDCC will continue to see huge growth in the near future,
bringing new levels of versatility to cloud network
programming and management.
[34] concentrated on realizing the security and forensic
problems of the MK Smart project, concentrating on the
challenges of securing such massive amounts of data on a
datahub and focusing on the best way to forensically
investigate large complex data such as data stored on Datahub.
Authors looked at MK Smart's issues. As this project relies
heavily on data (Big Data), countermeasures are important for
data protection and cyber-attacks (Forensics). MK Datahub is
stable with Arcserve UDP implementation and has reliable
backup and recovery solution. MK Smart Project also works
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
53
on digital forensics. Big data forensics remains a challenge for
the discipline of digital forensics, but data system like Hadoop
supported data acquisition through its layers, making it easy to
define and specify data on the data hub.
[35] went through the service specifics in-depth and looked at
their contacts to see what service information they were
referring to. LDA2 and word2 can help to balance accuracy
and speed in this situation. The results are applicable in the
real world. Transfer learning (i.e. training and testing) word
representations has been shown to improve the LDA
algorithm's performance. This is especially true in cold
climates and when using other approaches to create cutting-
edge models. Personal recommendations are made based on
the users' own results; Similar domain-based transfer learning
will be implemented in the Cloud to further reduce data
scarcity. We also know that when used in this setting, it is
efficient.
[36] Some virtualization issues related to cloud computing
technology isolation were investigated. Distributed side-
channel attacks, including modern multi-domain architectures,
are a major cloud infrastructure concern, according to the
researchers. The first DSCA classification to take advantage
of isolation violations was introduced: DSCAs are coordinated
attacks that use multiple local SCAs to infiltrate sensitive data
from various parts of a distributed system. Finally, they
proposed a plan for preventing side-channel attacks, which
included using an autonomous mechanism to execute a
moving defensive strategy, among other things. They are
primarily concerned with the design and implementation of
integrated cloud infrastructure for an autonomous mitigation
platform for a variety of SCA groups.
[19] Proposed a model for cloud federation creation that
considers CSP security levels. They begin by constructing a
collection of parameters that quantitatively define the
Security-SLA in the cloud using the Goal-Question-Metric
(GQM) process, and then using it to compare the security
levels of CSPs and existing federations to a given Security-
SLA baseline, taking into account CSP customers' security
satisfaction. The Cloud Federation's creation phase is then
modeled after a hedonic alliance game focused on CSP
security and reputation. They propose a federation-building
algorithm that enables CSPs to enter a federation while
mitigating security losses and avoiding federations that are
unstable. Experiments show that our model helps existing
federations maintain higher standards of safety while reducing
the frequency and severity of Security-SLA violations.
[37] The various characteristics of the Transportation Systems
Internet, security and privacy systems were discussed. Explore
how to combine AI and defense and cloud-based transport
systems were presented. Finally, he explained how to connect
AI, Protection, and Things Internet. 'It's just begun to detect
the depths of the Internet of Things they understand various
types of attacks and formulate ML techniques to fight them.
Also, consider how best to handle the attacks on the ML
techniques needed for IoT device development. Finally, we
must decide to shift the analytics firms to the stable cloud.
[26] Created a cloud flow optimization application and
performed an optimization Grey Relational Approach
(GREY). The resulting solution is a GRSA architecture that
efficiently uses requested flow type and current network
conditions to route flows through cloud data center networks,
ensuring optimal service levels. An experimental GRSA study
showed it provides better balanced loads, uses less energy
from the grid, and decreases the average transmission delay
compared to ECMP. This work aims to optimize QoS cloud
storage by guiding high-priority flows to predict high-priority
transmissions. Before collecting tracks from a Ceph storage,
authors defined three key types of traffic flows: low, medium,
and high volume. Next, find the best solution based on
diversity and network latency parameters for these flows. A
GRA-based flow scheduling tool was then used to solve the
routing path optimization problem covering both aggregation
and edge switches. They trace in a realistic setting. Authors
performed several experiments to demonstrate that GRSA can
provide sufficient capacity while avoiding high-critical delays
in busy conditions. But we want GRSA in a large cloud.
[26] Using Honeypot, the authors showed a new way to
handle malicious users. Honeypot may be used by
organizations to monitor alleged rogue members. Emulating
the attacker will easily understand the victim's actions.
Additional precautions are required as with each passing day,
risks are greater. Honeypots enhance detection and
surveillance capabilities as they build on more technologies.
They use cloud storage to be stable, fast, and affordable. With
all this tremendous industry growth, this innovation's
protection is at risk. Traffic diversion can be achieved in
different ways, but one of the most effective is using
honeypots. The method showed promising results in protective
systems evolution. Given the many legal problems that can
occur when installing Honeypot, a file-sharing application is
placed on a third-party server.
[38] They proposed architecture for a collaborative security
system focuses on risk recognition and analysis during the
collaborative platform's life cycle. the protection system is a
dynamic, active security system. A "1+3" security framework
collaboration network is proposed by the authors. In the
framework, they build on the details of the defense model
construction scheme. It provides new theoretical support for
collaborative research in security technology.
[39] RDFI methods for overcoming challenges were proposed.
RDFI uses chaos engineering concepts to secure the cloud,
executing, monitoring, analyzing, and scheduling security-
based injection campaigns across feedback loops. The fault
models in the knowledge base are focused on reliable
baselines, cloud security best practices, and input from
iterative fault injection campaigns. These findings aid in the
detection of flaws while also ensuring that security attributes
are adequately tested (integrity, confidentiality and
availability). Furthermore, through exchanging security
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
54
knowledge with security systems, RDFI facilitates risk
detection and security hardening. We developed and
implemented RDFI techniques as a software tool, including
various chaos engineering algorithms: CloudStrike.
CloudStrike performed several technology tests on Amazon
Web Services and Google Cloud Platform, two big cloud
infrastructure providers. With rising attack rates, performance
improves linearly over time. In addition, the efficacy of
CloudStrike security information was demonstrated by using
vulnerability analysis discovered by security fault injection to
harden cloud resource security. As a result, we believe our
methods are appropriate for addressing current cloud security
concerns.
[40] employed the new paradigm for cloud computing
requirements that incorporates four components, including
data security, risk assessment, law enforcement, industry, and
innovations to produce a dataset that scientists can work with
in Local governments benefit from attending to their present
and legacy IT system's ability to be interconnected. promoting
internal protection also enhances the system's controls and
firewalls Both government and cloud service providers have
expressed their support for shared responsibility The
discovery of how important regulations are to cloud protection
also highlights the greater need for enforcement in local
settings. For good measure, the business and security
specifications mention that governments should know about
data recovery, and encryption must also. studies study and
learn about cloud protection requirements in local
governments We are making progress in the areas of cloud
protection, but there are still major organizational, human, and
legal challenges to work around as well.
[41] AuthPrivacyChain, a blockchain-based privacy
management framework, was proposed. They use the
blockchain node account address as a form of identification
while also redefining cloud data access control authorization,
which is encrypted and stored in the blockchain. After that,
AuthPrivacyChain creates protocols for access control,
authorization, and revocation. They have used Enterprise
Operating System (EOS) to implement AuthPrivacyChain,
and the results show that AuthPrivacyChain is capable of not
only stopping hackers and administrators from accessing
resources illegally, but also of protecting privacy.
[42] Biometrics-based two-factor authentication and a hybrid
encryption algorithm are implemented. The efficiency of this
architecture is determined in Various tests on the internet
network include data uploading and downloading. The Frag
Secure Module encrypts the data, and then authentication is
checked and matched against the fingerprint. As this cloud
architecture is implemented, the findings show that fake and
real users can be distinguished 100 % of the time.
[29] addressed the issues that arise when data is inaccessible.
There was a lot of discussion about interoperability, but in a
few key cases, an open standard was proposed. The authors
focus on major cloud computing threats including denial of
service attacks, VM-level attacks, and DDoS-related service
interruption attacks.
[43] proposed a cloud computing and healthcare cloud
computing method. They would strengthen the authors'
healthcare architecture; cloud infrastructure has the ability to
significantly reduce healthcare costs while also allowing
countries to improve their overall health. Cloud protection
issues, including healthcare, have also been addressed.
They've also discussed and suggested ways to improve cloud
security.
[44] colleagues To enhance protection, the multi pein security
scheme was proposed, which provides more security than any
single-layer scheme currently in use. The algorithm, in
particular, ensures that only pre-authorized users have access
to cloud data and that downloading and uploading files is
faster and more reliable.
CSBAuditor, a novel cloud security application proposed by
[44] , can track device changes and incidents. The entities can
be linked together using the state transformation and
reconciler pattern CSBA, which employs a specific
mechanism for computing vulnerability severity scores (GCP)
to target various platforms with varying outcomes (GCP).
CSBAuditor has a performance rate of over 98 percent in
detecting problems. Furthermore, the production cost is
adequate.
[45] With service cost and multi-cloud risk perspectives, the
web service composition problem is formulated as a bi-
objective optimization problem. This is unmistakably an NP-
hard issue. To solve the combinatorial problem, the authors
devise a bi-objective time-varying particle swarm optimization
(BOTV-PSO) algorithm. To achieve a reasonable balance of
exploration and extraction, the parameters are changed based
on the amount of time elapsed. To demonstrate the
effectiveness of the proposed algorithm, the authors identified
several scenarios and compared its performance to that of a
multi-objective GA-based (MOGA) optimizer, a single
objective genetic algorithm (SOGA) that only optimizes the
cost function and ignores CSR, and a multi-objective
simulated annealing algorithm. According to the experimental
results, the proposed BOTV-PSO outperformed other
approaches in terms of convergence, diversity, fitness,
performance, and even scalability.
VII. DISCUSSION AND COMPARISON
Depending on the reviewed research in the literature review
section, a summarized comparison has extracted as shown in
Table2. Hence, the following points can be highlighted:
The majority of research has focused on or is aimed at
enhancing security, ensuring optimal service levels.
protecting data in the cloud, and ensuring optimal
service levels. They want something that is safe, fast,
and affordable.
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
55
Machine learning has used to Best manage attacks on
IoT devices that required ML techniques.
focus only on cost or time, or both in quality and
accessibility Focus on mobile cloud IoT security
problems and various factors affecting mobile IoT
security [5].
Most of the researchers proposed methods for avoiding
security threats as much as possible.
Based on an enterprise operation system (EOS), the
address the issue of leaked data by hackers or cloud
internal managers blockchain-based access control
framework with privacy protection called
AuthPrivacyChain implemented AuthPrivacyChain
hacks and admins can be prevented, along with privacy
being safeguarded.
Suggested a different way of using Honeypot to treat
malicious users. Monitor potential rogue
representatives more comfortably using the Honeypot
Technique in organizations. The acts of the perpetrator
can clearly be understood.
TABLE 1: LITERATURE REVIEW OF VARIOUS RESEARCH WORKS IN CLOUD SECURITY
Authors
Achieved Objectives
Depended Method
Implemented Field
Advantages
[21]
Investigate stakeholders' cloud
protection
method for avoiding security
threats as much as possible.
educational institutions.
discover some cloud benefits and
highlight key cloud disadvantages.
[27]
focus only on cost or time, or
both in quality and accessibility
Suggested The QoS multi-
workflow scheduling
solution
QoS requirements
Carries out the multiple QoS
priorities of the client, such as
implementation time, cost and
ongoing job preparation.
[32]
Focus on mobile cloud IoT
security problems and various
factors affecting mobile IoT
security.
Integrating IoT cloud
computing, mobile cloud
infrastructure, and IoT
Integrating mobile cloud
networks and IoT
Addressed the preventive steps
suggested by mobile cloud
researchers in different mobile cloud
computing areas
[33]
link the research community and
encourage SDE in cloud
environments.
identified the SDCC's
fundamental architectural
elements
SDCC values promote
change in large
organizations
Adding new levels of cloud network
programming and management
flexibility.
[34]
Concentrated on knowing MK
Smart's security and forensic
issues
UDP implementation, and
MK Datahub
MK Smart Project is also
working on digital forensics
secure and has a reliable backup and
recovery solution
[35]
the accuracy of recommendation
will be improved with the
growth of individual data
used to examine the service
descriptions and perform
LDA on both the text and
location data
applied in various fields
provide personalized services based
on the users’ historical data
[36]
Develop and deploy
autonomous cloud mitigation
infrastructure for several SCA
groups.
Classification of DSCAs
used to exploit isolation
violations was introduced
virtualization problems
related to isolation of cloud
computing infrastructures
they have outlined a method to
reduce side-channel attacks
[19]
increases protection for existing
federations and reduces the
frequency and impact of
TrustNss..
using the Goal-Question-
Metric (GQM).
compare the security levels
of CSPs and federations
using a known Federated-
SEC baseline
minimizing security losses and
avoiding unstable federations
[37]
Best manage attacks on IoT
device required ML techniques
AI and security can be
mixed And cloud-based
transport systems.
Internet features of
Transportation Networks,
Protection and Privacy
Systems.
it has been more secure
[26]
Cloud storage data efficiently,
ensuring optimum service
levels.
Created an integer cloud
flow optimization program
and performed (GREY) for
optimization.
enhance the QoS for cloud
storage
uses fewer system resources, and
reduces the average transmission
delay
[38]
They want safe, fast, and
affordable. With all this
tremendous industry growth.
a new way to handle
malicious users, by using
Honeypot.
using the Honeypot strategy
in Organizations
track alleged rogue members more
comfortably. one can easily
understand the victim's actions.
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
56
[39]
focused on risk recognition and
review of the collaborative
platform's entire life cycle.
dynamic and active security
system.
collaborative manufacturing
platform.
It offers new theoretical support for
collaborative security technology
research.
[40]
mitigating of cloud issues
Risk-driven Fault Injection
(RDFI) techniques
RDFI applies chaos
engineering principles to
cloud security
a useful during testing of security
requirements (integrity,
confidentiality, and availability).
[41]
emphasized the importance of
cloud service providers and
governments as sharing their
resources
Incorporating the
international standard ISO
27002 and a number of good
practice security controls
cloud services by local
governments
provide critical insights for
governments that are adopting cloud
services
[42]
address issue of leaked data by
hackers or cloud internal
managers
blockchain-based access
control framework with
privacy protection called
AuthPrivacyChain
implemented
AuthPrivacyChain based on
an enterprise operation
system (EOS),
hacks and admins can be prevented,
along with privacy being
safeguarded
[29]
identification of fake and actual
users.
Biometric based Security
technique
performance of this
proposed architecture is
done in the .Net
predictive efficacy of the cloud
architecture and provide 100%
accuracy of fake and real user IDs
[43]
Solve the problems related to
the effects of the inaccessibility
of the data
an open standardized
framework in each of the
influential usage examples.
major cloud paradigm
security threats
denial of service attacks
[44]
enhance the cloud security
levels
a multilevel security scheme
Cloud space of individual
users
faster and better while doing so
when accessing a certain file
[45]
system that continuously scans
the cloud for malicious and
unauthorized activity
CSBAuditor
cloud infrastructure
It can find configuration errors in
real time with an accuracy rate of
98% The performance requirements
are also met.
VIII. CONCLUSION
Over the past decade, cloud-based market opportunities have
expanded tremendously. Cloud technologies are now a vital
part of corporate life, providing a momentous opportunity to
drive business by allowing us to be agile with our capital,
generating new collaborative opportunities. The cloud gives
companies, organizations, and even nations many advantages.
Despite several advantages, the cloud still faces many security
challenges. That's why the cloud's greatest challenge is
stability. Despite bringing many benefits, the cloud also faces
several security challenges. That's why stability is the cloud's
biggest problem. Customers and suppliers are mindful of
security risks. This paper reviewed the cloud computing
model in terms of different viewpoints including definitions,
cloud architectures, methods, and challenges. Three service
models (SaaS, PaaS and IaaS) and four deployment models
(private, public, hybrid and community cloud) are identified,
and the main objective of the current study is to present all
possible security challenges in cloud computing and provide
adequate solutions to these problems.
REFERENCES
[1] L. M. Abdulrahman, S. Zeebaree, S. F. Kak, M. Sadeeq,
A. Adel, B. W. Salim, et al., "A state of art for smart
gateways issues and modification," Asian Journal of
Research in Computer Science, pp. 1-13, 2021.
[2] Z. Ageed, M. R. Mahmood, M. Sadeeq, M. B.
Abdulrazzaq, and H. Dino, "Cloud computing resources
impacts on heavy-load parallel processing approaches,"
IOSR Journal of Computer Engineering (IOSR-JCE),
vol. 22, pp. 30-41, 2020.
[3] C. A. Sennewald and C. Baillie, Effective security
management: Butterworth-Heinemann, 2020.
[4] F. Abedi, S. R. Zeebaree, Z. S. Ageed, H. M. Ghanimi,
A. Alkhayyat, M. A. Sadeeq, et al., "Severity Based
Light-Weight Encryption Model for Secure Medical
Information System."
[5] H. Malallah, S. Zeebaree, R. R. Zebari, M. Sadeeq, Z. S.
Ageed, I. M. Ibrahim, et al., "A comprehensive study of
kernel (issues and concepts) in different operating
systems," Asian Journal of Research in Computer
Science, vol. 8, pp. 16-31, 2021.
[6] D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y.
Jararweh, "A survey on blockchain for information
systems management and security," Information
Processing & Management, vol. 58, p. 102397, 2021.
[7] L. M. Haji, O. M. Ahmad, S. Zeebaree, H. I. Dino, R. R.
Zebari, and H. M. Shukur, "Impact of cloud computing
and internet of things on the future internet," Technology
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
57
Reports of Kansai University, vol. 62, pp. 2179-2190,
2020.
[8] K. D. Ahmed and S. R. Zeebaree, "Resource allocation
in fog computing: A review," International Journal of
Science and Business, vol. 5, pp. 54-63, 2021.
[9] Z. S. Ageed, S. R. Zeebaree, M. M. Sadeeq, S. F. Kak, Z.
N. Rashid, A. A. Salih, et al., "A survey of data mining
implementation in smart city applications," Qubahan
Academic Journal, vol. 1, pp. 91-99, 2021.
[10] S. S. Wagle, M. Guzek, P. Bouvry, and R. Bisdorff, "An
evaluation model for selecting cloud services from
commercially available cloud providers," in 2015 IEEE
7th International Conference on Cloud Computing
Technology and Science (CloudCom), 2015, pp. 107-
114.
[11] R. W. Anwar, T. Abdullah, and F. Pastore, "Firewall
Best Practices for Securing Smart Healthcare
Environment: A Review," Applied Sciences, vol. 11, p.
9183, 2021.
[12] A. Sunyaev and S. Schneider, "Cloud services
certification," Communications of the ACM, vol. 56, pp.
33-36, 2013.
[13] Z. S. Ageed, S. R. Zeebaree, M. M. Sadeeq, S. F. Kak,
H. S. Yahia, M. R. Mahmood, et al., "Comprehensive
survey of big data mining approaches in cloud systems,"
Qubahan Academic Journal, vol. 1, pp. 29-38, 2021.
[14] H. Al-Shqeerat, F. Al-Shrouf, M. R. Hassan, and H.
Fajraoui, "Cloud computing security challenges in higher
educational institutions-A survey," International Journal
of Computer Applications, vol. 161, pp. 22-29, 2017.
[15] M. H. Ryu, J. Kim, and S. Kim, "Factors affecting
application developers’ loyalty to mobile platforms,"
Computers in Human Behavior, vol. 40, pp. 78-85, 2014.
[16] D. A. Fernandes, L. F. Soares, J. V. Gomes, M. M.
Freire, and P. R. Inácio, "Security issues in cloud
environments: a survey," International Journal of
Information Security, vol. 13, pp. 113-170, 2014.
[17] S. H. Haji, S. Zeebaree, R. H. Saeed, S. Y. Ameen, H. M.
Shukur, N. Omar, et al., "Comparison of software
defined networking with traditional networking," Asian
Journal of Research in Computer Science, pp. 1-18,
2021.
[18] Z. J. Hamad and S. R. Zeebaree, "Recourses utilization
in a distributed system: A review," International Journal
of Science and Business, vol. 5, pp. 42-53, 2021.
[19] T. Halabi and M. Bellaiche, "Towards security-based
formation of cloud federations: A game theoretical
approach," IEEE transactions on cloud computing, vol.
8, pp. 928-942, 2018.
[20] Z. S. Hammed, S. Y. Ameen, and S. R. Zeebaree,
"Massive MIMO-OFDM performance enhancement on
5G," in 2021 International Conference on Software,
Telecommunications and Computer Networks
(SoftCOM), 2021, pp. 1-6.
[21] R. J. Hassan, S. Zeebaree, S. Y. Ameen, S. F. Kak, M.
Sadeeq, Z. S. Ageed, et al., "State of art survey for iot
effects on smart city technology: challenges,
opportunities, and solutions," Asian Journal of Research
in Computer Science, vol. 22, pp. 32-48, 2021.
[22] T. M. G. Sami, Z. S. Ageed, Z. N. Rashid, and Y. S.
Jghef, "Distributed, Cloud, and Fog Computing
Motivations on Improving Security and Privacy of
Internet of Things," Mathematical Statistician and
Engineering Applications, vol. 71, pp. 7630-7660, 2022.
[23] Y. S. Jghef and S. Zeebaree, "State of art survey for
significant relations between cloud computing and
distributed computing," International Journal of Science
and Business, vol. 4, pp. 53-61, 2020.
[24] Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai,
"Web application security assessment by fault injection
and behavior monitoring," in Proceedings of the 12th
international conference on World Wide Web, 2003, pp.
148-159.
[25] B. T. Jijo, S. Zeebaree, R. R. Zebari, M. Sadeeq, A. B.
Sallow, S. Mohsin, et al., "A comprehensive survey of
5G mm-wave technology design challenges," Asian
Journal of Research in Computer Science, vol. 8, pp. 1-
20, 2021.
[26] W. Ke, Y. Wang, and M. Ye, "GRSA: service-aware
flow scheduling for cloud storage datacenter networks,"
China Communications, vol. 17, pp. 164-179, 2020.
[27] A. Kumar, P. S. Kumar, and T. Sairam, "Organization
Assignment in Federated Cloud Environments based on
MultiTarget Optimization of Security," Cyber Security
in Parallel and Distributed Computing: Concepts,
Techniques, Applications and Case Studies, pp. 139-147,
2019.
[28] N. T. Muhammed, S. R. Zeebaree, and Z. N. Rashid,
"Distributed Cloud Computing and Mobile Cloud
Computing: A Review," QALAAI ZANIST JOURNAL,
vol. 7, pp. 1183-1201, 2022.
[29] A. Narang, D. Gupta, and A. Kaur, "Biometrics-based
un-locker to enhance cloud security systems,"
International journal of cloud applications and
computing (IJCAC), vol. 10, pp. 1-12, 2020.
[30] G. A. Qadir and S. R. Zeebaree, "Evaluation of QoS in
distributed systems: A review," International Journal of
Science and Business, vol. 5, pp. 89-101, 2021.
[31] H. S. Yahia, S. Zeebaree, M. Sadeeq, N. Salim, S. F.
Kak, A. Adel, et al., "Comprehensive survey for cloud
computing based nature-inspired algorithms optimization
scheduling," Asian Journal of Research in Computer
Science, vol. 8, pp. 1-16, 2021.
[32] A. Dumka, M. Memoria, and A. Ashok, "Security and
Challenges in Mobile Cloud Computing," Security
Designs for the Cloud, Iot, and Social Networking, pp.
43-57, 2019.
[33] A. A. Abbasi, A. Abbasi, S. Shamshirband, A. T.
Chronopoulos, V. Persico, and A. Pescapè, "Software-
defined cloud computing: A systematic review on latest
trends and developments," IEEE Access, vol. 7, pp.
93294-93314, 2019.
[34] E. Okai, X. Feng, and P. Sant, "Security and Forensics
Challenges to The MK Smart Project," in 2019 IEEE
Omer et al. / Journal of Applied Science and Technology Trends Vol. 03, No. 02, pp. 47 58, (Year)
58
SmartWorld, Ubiquitous Intelligence & Computing,
Advanced & Trusted Computing, Scalable Computing &
Communications, Cloud & Big Data Computing, Internet
of People and Smart City Innovation
(SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
2019, pp. 1666-1670.
[35] C. Lei, H. Dai, Z. Yu, and R. Li, "A service
recommendation algorithm with the transfer learning
based matrix factorization to improve cloud security,"
Information Sciences, vol. 513, pp. 98-111, 2020.
[36] M.-M. Bazm, M. Lacoste, M. Südholt, and J.-M.
Menaud, "Isolation in cloud computing infrastructures:
new security challenges," Annals of Telecommunications,
vol. 74, pp. 197-209, 2019.
[37] B. Thuraisingham, "Cyber security and artificial
intelligence for cloud-based internet of transportation
systems," in 2020 7th IEEE International Conference on
Cyber Security and Cloud Computing (CSCloud)/2020
6th IEEE International Conference on Edge Computing
and Scalable Cloud (EdgeCom), 2020, pp. 8-10.
[38] P. S. Negi, A. Garg, and R. Lal, "Intrusion detection and
prevention using honeypot network for cloud security,"
in 2020 10th International Conference on Cloud
Computing, Data Science & Engineering (Confluence),
2020, pp. 129-132.
[39] K. Lu, Q. Han, G. Zhu, and B. Huang, "Research on the
whole process security system framework of network
collaborative manufacture," in 2020 Chinese Control
And Decision Conference (CCDC), 2020, pp. 5530-5534.
[40] K. A. Torkura, M. I. Sukmana, F. Cheng, and C. Meinel,
"Cloudstrike: Chaos engineering for security and
resiliency in cloud infrastructure," IEEE Access, vol. 8,
pp. 123044-123060, 2020.
[41] O. Ali, A. Shrestha, A. Chatfield, and P. Murray,
"Assessing information security risks in the cloud: A
case study of Australian local government authorities,"
Government Information Quarterly, vol. 37, p. 101419,
2020.
[42] C. Yang, L. Tan, N. Shi, B. Xu, Y. Cao, and K. Yu,
"AuthPrivacyChain: A blockchain-based access control
framework with privacy protection in cloud," IEEE
Access, vol. 8, pp. 70604-70615, 2020.
[43] T. Alam, "Cloud Computing and its role in the
Information Technology," IAIC Transactions on
Sustainable Digital Innovation (ITSDI), vol. 1, pp. 108-
115, 2020.
[44] S. M. Altowaijri, "An architecture to improve the
security of cloud computing in the healthcare sector," in
Smart Infrastructure and Applications, ed: Springer,
2020, pp. 249-266.
[45] K. A. Torkura, M. I. Sukmana, F. Cheng, and C. Meinel,
"Continuous auditing and threat detection in multi-cloud
infrastructure," Computers & Security, vol. 102, p.
102124, 2021.
... This is the case in order to ensure that the system is able to perform to the best of its abilities. The major purpose of the algorithms is to do this kind of thing [12]. The number in question is going to be . ...
... Dependable distributed systems[12] ...
Article
Full-text available
One definition of the word “distributed system” describes it as “a set of entities that collaborate in order to find a solution to a problem that cannot be solved by a single entity using their own resources.” This description of a distributed system is an example of a distributed system. As the number of algorithms that are mathematically complicated continues to increase, distributed computing systems have emerged as a direct result of this trend. The optimization of a distributed computing system has been accomplished via the development of methods for the distribution of work and the scheduling of jobs. Because of this, the system has been able to be used in a more efficient manner. Task scheduling refers to the process of selecting the order in which actions are carried out in response to a given set of circumstances. On the other hand, task allocation is the process of allocating tasks to the processors in a system that are the most fit for taking on those tasks. This procedure determines which processors are assigned the jobs. Within the context of distributed systems, the objective of this article is to provide a detailed review of the several approaches to task scheduling that have been used by researchers.
... New data management systems, such as NOSQL databases and data warehouse architectures, appear in the marketplace regularly, and consumers switch from relational databases to more immediate plans. Innovations of big data are absent because of the scarcity of people with expertise [19]. ...
Article
Full-text available
Complex data systems are incapable of processing large data volumes, rendering the task of retrieving pertinent information unattainable. The advent of the Internet has amplified the significance of accessible and readily available information. Additionally, it receives support from the World Wide Web Consortium (W3C) and global organizations responsible for establishing web standards, such as Web Ontology, Inc. It expands the functionality of the website to facilitate the retrieval, integration, and transmission of information. In recent years, several major organizations have shown a strong inclination towards using semantic technologies for the purpose of collecting Big Data. Undoubtedly, there are other advantages of integrating this into the Creative. It enhances the ability of end-users to manage data from many repositories, focuses on changing the corporate environment and the user experience, and incorporates individual definitions and integrates several data sources. Furthermore, the market’s evolving expectations and contemporary organizational practices require an adaptable but all-encompassing information strategy. Integration of data warehousing may be achieved by the use of scattered corporate ontologies. This study explores the impact of the Semantic Web on enhancing the intelligence of Big Data. It analyses the obstacles and opportunities associated with the integration of Big Data with the Semantic Web.
... This category of electronic devices encompasses a wide range of things, including but not limited to automobiles, home appliances, mobile phones, and other similar items. When it comes to the Internet of Things (WoT), the concept centres on the capability of business devices to detect and collect data on a worldwide scale, and then to send this data across a network for the goal of processing and using it in a wide variety of exciting activities [7,8]. ...
Article
Full-text available
Utilising the dispersed resources that are accessible inside a cluster, the dispersed Deep Learning System (DDLS) is able to successfully complete the process of training complex neural network models. This is accomplished by utilising the resources to their full potential. As a consequence of this, the system is able to get insights about neural network models that are becoming more complex. Individuals who work as engineers for distributed deep learning systems are needed to make a variety of decisions in order to properly manage their specialised job within the environment of their choice. This is necessary in order to ensure that the job is efficiently managed. Achieving this is very necessary in order to guarantee that they will be able to carry out their obligations. Throughout the course of the last several years, deep learning programmes have uncovered significant applications in a broad range of different industries. A few examples of these domains include image recognition, natural language processing, semantic understanding, financial analysis, and aided healthcare. These are only few of the topics that fall under this category. All of these factors have led to a significant growth in the amount of information that is being used in each and every application. The continued penetration of information into a number of different sectors, as well as the increasing complexity of computations and the restrictions of models, have all contributed to this. Because of this, there has been a significant increase in the quantity of information that is being employed on a worldwide scale for various purposes.
... Performing this action is done with the intention of achieving the goal of acquiring knowledge. Through the use of their extensive research, which will be made available to them, they will give guidance on trends that are anticipated to arise in the years to come [22]. ...
Article
Full-text available
Over the last several years, there has been a significant rise in the number of people getting online and using the internet. Individual hypertext links are available, and any one of them may be used to get access to the resource. There is a variety of hypertext links available. It has been feasible to construct new websites as a result of the growth of crawlers, which has been facilitated by the rise in the number of people who use the internet. Web crawlers are highly evolved search engines that make it simpler for customers to get the information they are searching for on the internet. Web crawlers are also known as web crawlers. In a similar vein, these web crawlers have the potential to be used for more research endeavours in the months and years to come. Furthermore, the information that has been gathered may be used to detect and uncover any connections that are absent, as well as to assess the possibility for expansion inside complicated networks. This can be done by discovering any connections that are missing. The analysis of web crawlers is the primary topic of this study. Topics covered include the architecture of web crawlers, the many types of web crawlers, and the challenges that search engines have while using web crawlers.
... One of the most significant benefits brought about by the development of this technology is the ability to access cloud computing from any place and on any device. This is one of the most essential advantages brought about by the development of this technology [62,63]. This is one of the most important advantages that may be acquired by adopting this technology. ...
Article
Full-text available
It is now possible for billions of devices to connect to the internet at the same time thanks to a concept that is known as the Internet of Things. There are several applications for the Internet of Things, such as in smart cities, smart homes, and e-health; however, each of these uses has its own unique challenges in terms of ensuring that data is kept secure. Firewalls and intrusion detection systems, which are two of the most important aspects of network security, will need upgrades in order to be compatible with the networking architecture that is currently in use. These upgrades may be done by installing new software. When discussing a variety of technological services, it is standard custom to use the words "cloud computing" and "the Internet of Things" interchangeably. This is due to the fact that cloud computing and the Internet of Things are complimentary to one another in terms of the value they provide. Additionally, the combination of the two may lead to the development of a solution that is more comprehensive for the Internet of Things if the right conditions are met. This study has a primary emphasis on the several machine learning and deep learning approaches that have recently been created in the realm of Internet of Things (IoT) security research. These techniques are adaptable enough to resolve a large variety of various kinds of security problems. In this piece, we take an in-depth look at a number of different cloud computing service models and cloud deployment tactics, in addition to the architecture of the Internet of Things and the safety of the IoT. In conclusion, we go deeply into the cutting-edge machine learning and deep learning approaches that are now available for use in addressing a wide variety of problems relating to the safety of IoT networks. Both of these learning techniques are referred to as "advanced."
... It is highly likely that the hardware of a web server will need to be modified in a different way for it to be able to deal with the extremely high number of requests that are being directed toward it. This modification could take the form of adding additional processing power or memory to the server [40]. Embedded devices, such as a router, that already feature an in-built, miniature web server for the purpose of configuring the device will be the option that results in the lowest total cost when compared to the other solutions that are available. ...
Article
Full-text available
Since the occurrence of COVID-19, many firms have made the transition to using remote workers, and many aspects of work and day-to-day life, including corporations, classes, and even individual users, have grown more dependent on internet resources. Computers can be found almost everywhere, and the vast majority of them are connected to the Internet, which is the largest network in the world. The use of the internet is fraught with peril as a result of the proliferation of cyberattacks designed to undermine the confidentiality, authenticity, and accessibility of computer networks that are connected to the internet. One of the most typical problems that may arise with computer networking is an assault known as a distributed denial of service, or DDoS. DDoS assault aimed at preventing users from accessing the targeted systems. Every day, these assaults put at risk a huge number of customers and Internet service providers (ISPs) and have an influence on them. This enormous problem is still becoming worse at an alarming pace, in spite of the fact that various defensive strategies are always being suggested as potential solutions. Because they pretend to be legitimate traffic, the vast majority of distributed denial of service assaults are never discovered. Intrusion Detection Systems (IDS) may be able to assist in mitigating the effects of this situation; nevertheless, there are sophisticated assaults for which there is no known way of detection. We analyse the basic features of DDoS assaults, the numerous forms of DDoS attacks that may arise, and the various machine learning methods that are used to avoid and mitigate these attacks. Based on this analysis, we develop a system for identifying DDoS attacks with enhanced accuracy and reduced false-positive rates.
... This potential is based on the fact that expert systems use human-level reasoning, domain-specific knowledge, and experience. This possibility arises from the fact that expert systems make use of reasoning on par with that of humans, as well as domain-specific knowledge and experience [59]. This is a possibility brought about by the fact that expert systems use human-level reasoning in addition to the knowledge and experience that are subject-specific in nature. ...
Article
Full-text available
Despite quick, secure connections being more commonplace, consumers remain intrigued by the Internet of Things (IoT) because of its simplicity. A consequence of this is that the science world becomes more engaged in researching and developing innovative approaches. Since almost everything on the Internet has its weaknesses, hackers can exploit these weaknesses in order to get access to Information. If there are flaws, it's subject to a variety of dangers and attacks from possible attackers. The typical assault or attempt would target people with devices and programs to acquire something in return. A comprehensive overview of the several ways attack prevention is used in IoT network deployments, including the various attack patterns and their responses, was discussed in this article.
Chapter
In the modern age of technology, the term cloud computing is getting hype day by day. Cloud computing platform works based on on-demand services on the Internet due to the virtualization environment. The basic feature of this technology is that it provides pay as you use the model in which users are free to invest in the heavy cost of infrastructure and the only cost is linked with the utilization of the services. Due to the scalability, flexibility, and virtualization features customers do not feel secure to use this versatile platform. Regardless of its benefits it also has a lot of security risks and threats those are associated with cloud computing like authentication mechanisms, multi-tenant, virtualization, traditional security risks of the CIA model, data segregation, and privacy. Cloud service providers provide the service to the cloud customers that delivers services by using web technology that arises new security threats. This chapter introduces a detailed literature review to perform an analysis of the information security threats associated with cloud computing and some suggestions. A literature review has been conducted on the information security issues associated with cloud service providers and users. Additionally, the chapter also describes cloud services, models, cloud technologies, and cloud security concepts along with offering recommendations to enhance data security, user privacy, and mitigate these concerns.
Article
Full-text available
In spite of the benefits afforded by wireless communications networks, maintaining the confidentiality and safety of wireless networks remains a significant obstacle and source of worry. The principal uses of wireless communication networks are found in the military, commercial, retail, transportation, healthcare, and many other fields; these systems utilise wired, cellular, or ad hoc networks. Other applications of wireless communication networks include: In recent years, a substantial amount of research attention has been focused on the Internet of Things (IoT). Looking forward, the IoT will play an important role and will affect our lives as well as the standards and business models that we now use. It is anticipated that the usage of IoT in a variety of applications would significantly rise during the next several years. The Internet of Things makes it possible for billions of different individuals, equipment, and services to connect with one another and share information. IoT networks are becoming more vulnerable to a wide variety of security threats as their usage continues to grow. In order to provide identification, secrecy, access control, and integrity, among other things, effective security and privacy protocols are an absolute need for Internet of Things (IoT) networks. This Mathematical Statistician and Engineering Applications article presents a research that is both extensive and comprehensive on the topic of privacy and security in IoT.
Article
Full-text available
Smart healthcare environments are growing at a rapid pace due to the services and benefits offered to healthcare practitioners and to patients. At the same time, smart healthcare environments are becoming increasingly complex environments where a plethora of devices are linked with each other, to deliver services to patients, and they require special security measures to protect the privacy and integrity of user data. Moreover, these environments are exposed to various kinds of security risks, threats, and attacks. Firewalls are considered as the first line of defense for securing smart healthcare networks and addressing the challenges mentioned above. Firewalls are applied at different levels in networks, and range from conventional server-based to cloud-based firewalls. However, the selection and implementation of a proper firewall to get the maximum benefit is a challenging task. Therefore, understanding firewall types, the services offered, and analyzing underlying vulnerabilities are important design considerations that need addressing before implementing a firewall in a smart healthcare environment. The paper provides a comprehensive review and best practices of firewall types, with offered benefits and drawbacks, which may help to define a comprehensive set of policies for smart healthcare devices and environments.
Article
Full-text available
The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and responding to the load modifications and faults through network reconfiguring. The current networks are likewise vertically incorporated to make matters far more complicated: the control and data planes are bundled collectively. Software-Defined Networking (SDN) is an emerging concept which aims to change this situation by breaking vertical incorporation, promoting the logical centralization of the network control, separating the network control logic from the basic switches and routers, and enabling the network programming. The segregation of concerns identified between the policies concept of network, their implementation in hardware switching and data forwarding is essential to the flexibility required: SDN makes it less Review Article complicated and facilitates to make and introduce new concepts in networking through breaking the issue of the network control into tractable parts, simplifies the network management and facilitate the development of the network. In this paper, the SDN is reviewed; it introduces SDN, explaining its core concepts, how it varies from traditional Furthermore, we presented the crucial advantages and challenges of SDN security, flexibility, and performance. Finally, a brief conclusion of SDN is revised.
Article
Full-text available
Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, increased traffic, increased noise, increased energy consumption, increased water use, and land pollution, and waste. Thus, the issue of security, coupled with sustainability, is expected to be addressed in cities that use their brain. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). IoT connectivity is understood to be the very heart of the city of what makes a smart city. such as sensor networks, wearables, mobile apps, and smart grids that have been developed to harness the city's most innovative connectivity technology to provide services and better control its citizens The focus of this research is to clarify and showcase ways in which IoT technology can be used in infrastructure projects for enhancing both productivity and responsiveness.
Article
Full-text available
Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types of OS to address their flaws. This paper's center of attention is the visual operating system based on the OS features and their limitations and strengths by contrasting iOS, Android, Mac, Windows, and Linux operating systems. Linux, Android, and Windows 10 are more stable, more compatible, and more reliable operating systems. Linux, Android, and Windows are popular enough to become user-friendly, unlike other OSs, and make more application programs. The firewalls in Mac OS X and Windows 10 are built-in. The most popular platforms are Android and Windows, specifically the novelist versions. It is because they are low-cost, dependable, compatible, safe, and easy to use. Furthermore, modern developments in issues resulting from the advent of emerging technology and the growth of the cell phone introduced many features such as high-speed processors, massive memory, multitasking, high-resolution displays, functional telecommunication hardware, and so on.
Article
Full-text available
Many applications in the real world include optimizing specific targets, such as cost minimization, energy conservation, climate, and maximizing production, efficiency, and sustainability. The optimization problem is strongly non-linear with multifunctional landscapes under several dynamic, non-linear constraints in some instances. It is challenging to address those issues. Also, with the increasing strength of modern computers, simplistic brute force methods are still inefficient and unwanted. Practical algorithms are also vital for these implementations whenever possible. Cloud computing has become an essential and popular emerging computing environment that supports on-demand services and provides internet-based services. Cloud computing allows a range of services and tools to be easily accessed from anywhere in the world. Since cloud computing has global access to its services, there will always be threats and challenges facing its servers and services, such as; task scheduling, security, energy efficiency, network load, and other challenges. In the research area, many algorithms have been addressed to solve these problems. This paper investigates relevant analysis and surveys on the above topics, threats, and outlooks. This paper offers an overview of nature-inspired algorithms, their applications, and valuation, emphasizing cloud computing problems. Many problems in science and engineering can be viewed Review Article Yahia et al.; AJRCOS, 8(2): 1-16, 2021; Article no.AJRCOS.68322 2 as optimization problems with complex non-linear constraints. Highly nonlinear solutions typically need advanced optimization algorithms, and conventional algorithms can have difficulty addressing these issues. Because of its simplicity and usefulness, nature-inspired algorithms are currently being used. There are nevertheless some significant concerns with computing and swarming intelligence influenced by evolution.
Article
Full-text available
Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices and the utilization of resources and communicating more effectively and creatively for our employees. Extensive data analysis is a comparatively modern technology that is capable of expanding intelligent urban facilities. Digital extraction has resulted in the processing of large volumes of data that can be used in several valuable areas since digitalization is an essential part of daily life. In many businesses and utility domains, including the intelligent urban domain, successful exploitation and multiple data use is critical. This paper examines how big data can be used for more innovative societies. It explores the possibilities, challenges, and benefits of applying big data systems in intelligent cities and compares and contrasts different intelligent cities and big data ideas. It also seeks to define criteria for the creation of big data applications for innovative city services.
Article
Full-text available
Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated. Review Article Jijo et al.; AJRCOS, 8(1): 1-20, 2021; Article no.AJRCOS.68058 2
Article
The rapid increase in the number of users, there is a rise in issues related to hardware failure, web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data. With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing practices. With a tremendous development in this technology, there is ever increasing chance of its security being compromised by malicious users. A way to divert malicious traffic away from systems is by using Honeypot. It is a colossal strategy that has shown signs of improvement in security of systems. Keeping in mind the various legal issues one may face while deploying Honeypot on third-party cloud vendor servers, the concept of Honeypot is implemented in a file-sharing application which is deployed on cloud server. This paper discusses the detection attacks in a cloud-based environment as well as the use of Honeypot for its security, thereby proposing a new technique to do the same.
Conference Paper
Multi Input Multi Output MIMO and Orthogonal Frequency Division Multiplexing OFDM based communication strategies have gained popularity in the industry and research fields due to the rising demand for wireless cellular communication. Massive MIMO-OFDM-based cellular communication has recently become popular in a variety of realtime applications. However, as the need for high-quality communication grew, so did the number of users, posing various problems. In this article, we presented a comprehensive review study about Massive MIMO-OFDM based communication techniques and development. We mainly focus on essential parameters of Massive MIMO-OFDM, which play an essential role in 5G communication such as PAPR, precoding, channel estimation, and error-correcting codes. The paper shows results on the energy efficiency for a wireless (MIMO) link operating at millimeter-wave frequencies (mmWave) in a typical 5G scenario, showing the impact of the above essential parameters on the 5G performance. This comprehensive review and comparison will research 5G development and applications to adopt the proper techniques to achieve their demand.