A detailed review of Cloud Security: Issues, Threats & Attacks

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Cloud Computing Security Challenges: A Review

  • Conference paper
  • First Online: 21 May 2021
  • Cite this conference paper

cloud computing security research paper

  • Iqra Kanwal 13 ,
  • Hina Shafi 13 ,
  • Shahzad Memon 13 &
  • Mahmood Hussain Shah PhD 14  

Part of the book series: Advanced Sciences and Technologies for Security Applications ((ASTSA))

1769 Accesses

4 Citations

Over the last two decades, cloud computing has gained tremendous popularity because of ever growing requirements. Organizations that are heading towards cloud-based data storage options have several benefits. These include streamlined IT infrastructure and management, remote access with a secure internet link from all over the globe, and the cost-effectiveness that cloud computing can offer. The related cloud protection and privacy issues need to be further clarified. This paper aims to discuss all possible issues that are under research and are resisting consumers to migrate from traditional IT environment to new trend of cloud computing which offers flexible and scalable environment at low-cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

cloud computing security research paper

A survey on security challenges in cloud computing: issues, threats, and solutions

cloud computing security research paper

A Survey on Data Security Challenges and Their Solutions in Cloud Computing

cloud computing security research paper

An Overview on Data Security in Cloud Computing

Stanoevska-Slabeva K, Wozniak T, Ristol S (2010) Grid and cloud computing: a business perspective on technology and applications

Google Scholar  

Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid computing environments workshop, GCE 2008

Shaikh FBF, Haider S (2011) Security threats in cloud computing. In: 2011 International conference on internet technology and secured transactions, no December, pp 214–219

Mell P, Grance T (2011) The NIST definition of cloud computing. In: Cloud computing and government: background, benefits, risks

Freire MM, Inácio PRM (2014) Security issues in cloud environments : a survey, pp 113–170

Chauhan S et al (2018) Amazon virtual private cloud (Amazon VPC) and networking fundamentals. In: AWS® certified advanced networking official study guide

Varghese B, Buyya R (2018) Next generation cloud computing: new trends and research directions. Future Gener Comput Syst 79(September):849–861

Article   Google Scholar  

Birje MN, Challagidad PS, Goudar RH, Tapale MT (2017) Cloud computing review: concepts, technology, challenges and security. Int J Cloud Comput 6(1):32–57

Cloud computing security issues and challenges, no Jan 2011, 2015

Yang C, Huang Q, Li Z, Liu K, Hu F (2017) Big data and cloud computing: innovation opportunities and challenges. Int J Digit Earth 10(1):13–53

Khorshed T, Ali ABMS, Wasimi SA (2012) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener Comput Syst 28(6):833–851

Computing C (2014) A survey of cryptographic based security algorithms, vol 8, no March, pp 1–17

Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18

Mehraeen E, Ghazisaeedi M, Farzi J, Mirshekari S (2016) Security challenges in healthcare cloud computing: a systematic review. Glob J Health Sci 9(3):157

Mogos G (2019) Cloud security. Crit Anal 17(3):51–54

Sahmim S, Gharsellaoui H (2017) Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput Sci 112:1516–1522

Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

Paper C, Science PC (2015) State-of-the-art survey on cloud computing security challenges, approaches and solutions state-of-the-art survey on cloud computing security challenges, approaches and solutions, no June

Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B (2010) Security issues for cloud computing. Int J Inf Secur Priv 4(2):36–48

Khorshed MT, Ali ABMS, Wasimi SA (2012) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener Comput Syst 28(6):833–851

Sengupta S, Kaulgud V, Sharma VS (2011) Cloud computing security—trends and research directions. In: Proceedings of the 2011 IEEE world congress on services, no 4, pp 524–531

Abdul-Jabbar SS, Aldujaili A, Mohammed SG, Saeed HS (2020) 西 南 交 通 大 学 学 报 Integrity and security in cloud computing environment: a review 云计算环境中的完整性和安全性:回顾. J Southwest Jiaotong Univ 55(1):1–15

Subramanian N, Jeyaraj A (2018) Recent security challenges in cloud computing. Comput Electr Eng 71(July):28–42

Fatima S, Ahmad S (2019) An exhaustive review on security issues in cloud computing. KSII Trans Internet Inf Syst 13(6):3219–3237

Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 24(June):133–141

Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592

Chen D (2012) Data Security and privacy protection issues in cloud computing, no 973, pp 647–651

Cloud Security Alliance (2010) Top threats to cloud computing. Security

Rocha F, Correia M (2011) Lucy in the sky without diamonds: Stealing confidential data in the cloud. In: Proceedings of the international conference on dependable systems and networks

Rong C, Nguyen ST, Gilje M (2013) Beyond lightning: a survey on security challenges in cloud computing q. Comput Electr Eng 39(1):47–54

Bernsmed K, Jaatun MG, Undheim A (2011) Security in service level agreements for cloud computing. In: CLOSER 2011—Proceedings of the 1st international conference on cloud computing and services science

Download references

Author information

Authors and affiliations.

Faculty of Engineering and Technology, University of Sindh, Jamshoro, Pakistan

Iqra Kanwal, Hina Shafi & Shahzad Memon

Northumbria University, Newcastle upon Tyne, UK

Mahmood Hussain Shah PhD

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Mahmood Hussain Shah PhD .

Editor information

Editors and affiliations.

London Campus, Northumbria University, London, UK

Hamid Jahankhani

Northumbria University, London, UK

Arshad Jamal

Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK

Shaun Lawson

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Kanwal, I., Shafi, H., Memon, S., Shah, M.H. (2021). Cloud Computing Security Challenges: A Review. In: Jahankhani, H., Jamal, A., Lawson, S. (eds) Cybersecurity, Privacy and Freedom Protection in the Connected World. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-68534-8_29

Download citation

DOI : https://doi.org/10.1007/978-3-030-68534-8_29

Published : 21 May 2021

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-68533-1

Online ISBN : 978-3-030-68534-8

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. (PDF) Ensure data security in cloud computing by using cryptography

    cloud computing security research paper

  2. (PDF) A Comprehensive Study of Security in Cloud Computing

    cloud computing security research paper

  3. (PDF) Cloud Computing and Security Fundamentals

    cloud computing security research paper

  4. (PDF) Cloud Security

    cloud computing security research paper

  5. (PDF) Special issue on security in cloud computing

    cloud computing security research paper

  6. (PDF) Cloud Computing and Security Issues

    cloud computing security research paper

VIDEO

  1. Exploring Cloud Computing Security Risks & Virtual Data Room Solutions

  2. Cloud Threat Hunting

  3. Cloud Computing Security Issues and Challenges in SAAS Environment

  4. Top Benefit of a Cloud Computing Security Solution

  5. 🔥 Introduction to Cloud Security part 1 🔥

  6. Cloud Computing Tutorial for Beginners

COMMENTS

  1. A Systematic Literature Review on Cloud Computing Security

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumer A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies | IEEE Journals & Magazine | IEEE Xplore

  2. (PDF) Cloud Security

    This paper reviews the cloud security issues and concerns , while addressing various key topics like vulnerabilities, threats and mitigations, and cloud models. Architectural framework...

  3. Machine Learning for Cloud Security: A Systematic Review

    One of the ways to secure Cloud is by using Machine Learning (ML). ML techniques have been used in various ways to prevent or detect attacks and security gaps on the Cloud. In this paper, we provide a Systematic Literature Review (SLR) of ML and Cloud security methodologies and techniques.

  4. A Comprehensive Survey on Security in Cloud Computing

    This paper summarizes a number of peer-reviewed articles on security threats in cloud computing and the preventive methods. The objective of our research is to understand the cloud components, security issues, and risks, along with emerging solutions that may potentially mitigate the vulnerabilities in the cloud.

  5. A detailed review of Cloud Security: Issues, Threats & Attacks

    Different types of services are provided by trusted cloud providers over the Internet by using many technologies, which arises different security threats. This paper discusses about the cloud security issues, threats and related attacks.

  6. A Systematic Literature Review on Cloud Computing Security

    This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and challenges. This SLR examined the research studies...

  7. (PDF) Data Security in Cloud Computing

    This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data...

  8. Cloud Computing Security Challenges: A Review

    Cloud Computing Security Challenges: A Review. Conference paper. First Online: 21 May 2021. pp 459–469. Cite this conference paper. Download book PDF. Download book EPUB. Iqra Kanwal, Hina Shafi, Shahzad Memon & Mahmood Hussain Shah PhD. Part of the book series: Advanced Sciences and Technologies for Security Applications ( (ASTSA)) 1756 Accesses.