Security of cloud computing: belongings for the generations

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing plays an important role in Information Technology (IT) management. Consequently, various cloud computing developers and users experience different benefits and similarly challenges to its use and potential opportunities in driving the Fourth Industrial Revolution. Despite the increasing benefits of cloud computing, including increased speed of data processing and reduced costs compared to traditional computing, issues of security and privacy risk remain one of the greatest concerns in cloud computing. Through a systematic literature review, the evolution and developments in technology and issues of security and privacy from many years are examined to establish the trends in the threats; and thereby, provides a projection on the future of security of cloud computing. This paper presents the cloud computing aspects (types/aspects, and categories such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The paper dwells on the challenges of cloud computing going into the future with some solutions that have potential to work.




  • Keywords

    Cloud Computing; IT Management; Internet; Security.

  • References

      [1] Singh, Vaishali, and S. K. Pandey. "Research in cloud security: problems and prospects." International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) 3, no. 3 (2013): 305-314.

      [2] Gorelik, Eugene. "Cloud computing models." PhD diss., Massachusetts Institute of Technology, 2013.

      [3] Srivastava, P., Khan, R.: “A Review Paper on Cloud Computing.” International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), (2018).

      [4] Gillam, Lee, and Nick Antonopoulos, eds. Cloud computing: principles, systems, and applications. Springer, 2017.

      [5] Erl Thomas; Puttini Ricardo & Mahmood Zaigham. Cloud Computing: Concepts, Technology & Architecture. Prentice Hall. 2013.

      [6] Buyya Rajkumar; Broberg James &Goscinski. Cloud Computing: Principles and Paradigms. John Wiley & Sons. 2010.

      [7] Höfer, C. N., and Georgios Karagiannis. "Cloud computing services: taxonomy and comparison." Journal of Internet Services and Applications, 2(2), 81-94 (2011).

      [8] Alam, Md Imran, Manjusha Pandey, and Siddharth S. Rautaray. "A comprehensive survey on cloud computing." International Journal of Information Technology and Computer Science (IJITCS) 7, no. 2 (2015): 68.

      [9] Núñez, Alberto, Jose L. Vázquez-Poletti, Agustin C. Caminero, Gabriel G. Castañé, Jesus Carretero, and Ignacio M. Llorente. "iCanCloud: A flexible and scalable cloud infrastructure simulator." Journal of Grid Computing 10, no. 1 (2012): 185-209.

      [10] NedalTurab, Anas Abu Taleb and Shadi R Masadeh. “Cloud Computing Challenges and Solutions.” International Journal of Computer Networks and Communications. (2013). Vol.5, No.5.

      [11] Siani Pearson, George Yee. Privacy and Security for Cloud Computing. Springer Science and Business Media. 2012.

      [12] Yadav, R. Sharma, A.: “A Critical Review of Data Security in Cloud Computing Infrastructure. “International Journal of Advanced Studies of Scientific Research, 3(9), (2019).

      [13] W3 Schools. Cloud Security Challenges. Retrieved 23 August 2019 from

      [14] Isaca Information Systems Audit and Control Association. IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud. 2011.

      [15] Yousif, M.: "Cloud Computing Reliability – Failure is an Option" in IEEE Cloud Computing, 5(3), 4-5 (2018).




Article ID: 30396
DOI: 10.14419/ijet.v9i2.30396

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.