A systematic review of cyber security threats in Cloud Computing
Keywords:
Cyber security, Threats, Cloud Computing, and DDoS attacks, PRISMA methodology.Abstract
Cloud computing has become a fundamental technology for delivering scalable and cost-effective services; however, it faces significant challenges related to security and privacy. This study presents a systematic review of existing research on cloud computing threats and mitigation techniques using the PRISMA methodology. A total of 35 relevant articles were collected and analyzed to identify the major challenges affecting cloud environments and the solutions proposed in the literature. The review reveals that security and privacy issues represent the most critical challenges in cloud computing, with various types of cyberattacks targeting cloud infrastructures. Among these threats, Distributed Denial of Service (DDoS) attacks are the most frequently discussed and are considered the most severe due to their impact on service availability and performance. The findings highlight the urgent need for robust security mechanisms and effective countermeasures to mitigate DDoS attacks and enhance the overall security of cloud computing systems.
References
[1] Amir samami, 2020, Risk management in information technology.
[2] Tom M.Logan, Terje Aven, seth guikema, roger flage, 2021, The Role of Time in Risk and Risk Analysis: Implications for Resilience, Sustainability, and Management.
[3] Skemp, Kerry, MA, Salem, 2022, Cloud Computing.
[4] Tyndall Centre for Climate Change Research, 2006, Vulnerability, risk and adaptation.
[5] Meredith Stein, Vincent Campitelli, and Steven Mezzio, 2020, Managing the Impact of Cloud Computing.
[6] Maniaha, Edi Abdurachman, Ford Lumban Gaol Benfano Soewito, 2019, Survey on Threats and Risks in the Cloud Computing Environment.
[7] Abdul Raoof Wani, Q.P. Rana, U. Saxena and Nitin Pandey, 2019, Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques.
[8] Hisham A. Kholidy, 2019, Correlation-based sequence alignment models for detecting masquerades in cloud computing.
[9] Mamdouh Alenezi, 2020, SQL injection attacks countermeasures assessments.
[10] Natalya Bromall, Sushma Mishra, Peter Draus and John Stewart, A CASE STUDY-BASED ANALYSIS OF INNOVATIVE CLOUD TECHNOLOGIES IMPLEMENTATION: CHALLENGES, TOOLS AND BENEFITS OF AMAZON AWS.
[11] Turki ALQarni and Ahmed Barnawi, 2019, A Cloud adoption framework: assessing the factors and determinants of adoption cloud computing technology.
[12] Tong Kong,Liming Wang,Duohe Ma,Zhen Xu, Qian Yang and Kai Chen, 2019, A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
[13] Yoshita Sharma, Himanshu Gupta and Sunil Kumar Khatri, 2019, A Security Model for the Enhancement of Data Privacy in Cloud Computing.
[14] Haralambos Mouratidis, Shaun Shei and Aidan Delaney,2020, A security requirement modelling language for cloud computing environments.
[15] S. Logesswari, S. Jayanthi, D. KalaiSelvi, S. Muthusundari and V. Aswin, 2020, A study on cloud computing challenges and its mitigations.
[16] Ahmed Bakr. Abd El-Aziz, and Hesham A. Hefny, 2019, A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture.
[17] Nailah Afshan, 2017, Analysis and Assessment of the Vulnerabilities in Cloud Computing.
[18] Anupama Mishra and Neena Gupta, 2019, Analysis of Cloud Computing Vulnerability against DDoS.
[19] Omar Alia, Anup Shresthab, Akemi Chatfieldc and Peter Murray, 2019, Assessing information security risks in the cloud: A case study of Australian local government authorities.
[20] Rubens Matos, Jamilson Dantas, Eltton Araujo and Paulo Maciel, 2019, Bottleneck Detection in Cloud Computing Performance and Dependability: Sensitivity Rankings for Hierarchical Models.
[21] Jing Zhan, Xudong, Jin Han, Yaqi Gao, Xiaoqing Xia and Qian Zhang, 2019, CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study.
[22] Martin Lněnička and Jan Čapek, 2018, Classification and Evaluation of Cloud- Based Testing Tools: The Case Study of Web Applications’ Security Testing.
[23] Mohammed Farsia, Munwar Alib, Reehan Ali Shahc , Asif Ali Wagand and Radwan Kharabsheh, 2019, Cloud computing and data security threats taxonomy: A review.
[24] Yonggui Guo, Ibrahim Mohamed, Omar Abou-Sayed and Ahmed Abou-Sayed, 2019, Cloud computing and web application-based remote real-time monitoring and data analysis: slurry injection case study, Onshore USA.
[25] Alin Zamfiroiu, Ionut Petre and Radu Boncea, 2019, Cloud Computing Vulnerabilities Analysis.
[26] Rajat Saxena and Somnath Dey, 2019, DDoS attack prevention using collaborative approach for cloud computing.
[27] Anupama Mishra, Neena Gupta and B.B Gupta, 2021, Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller.
[28] Neha Agrawal and Shashikala Tapaswi, 2019, Defense Mechanisms against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges.
[29] Kriti Bhushan and B. Gupta, 2020, Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment.
[30] Hisham A. Kholidy, 2021, Detecting impersonation attacks in cloud computing environments using a centric user profiling approach.
[31] Hisham A. Kholidy, 2019, Correlation-based sequence alignment models for detecting masquerades in cloud computing.
[32] Dharitri Tripathy, Rudrarajsinh Gohil, and Talal Halabi, 2020, Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning.
[33] Gopal Singh Kushwah and Syed Taqi Ali, 2019, Distributed denial of service attacks detection in cloud computing using extreme learning machine.
[34] Hesham Abusaimeh, 2020, Distributed Denial of Service Attacks in Cloud Computing.
[35] Fursan Thabita, Prof.Sharaf Alhomdyc, Abdulrazzaq H. A. Al-Ahdalc and Prof. Dr. Sudhir Jagtap, 2020, Exploration of Security Challenges in Cloud Computing: Issues, Threats, and Attacks with their Alleviating Techniques.
[36] Jin Xiao and john Rofrando, 2017, Managing vulnerability in a cloud Native world with Bluefix.
[37] Sharad Dixit, Karuna P. Joshi and Seung Geol Choi, 2019, Multi Authority Access Control in a Cloud EHR System with MA-ABE.
[38] Gopal Singh Kushwah and Virender Ranga, 2021, Optimized extreme learning machine for detecting DDoS attacks in cloud computing.
[39] Walid I. Khedr, Khalid M. Hosny, Marwa M. Khashaba and Fathy A. Amer, 2020, Prediction-based secured handover authentication for mobile cloud computing.
[40] Steve Jones 1 & Zahir Irani 2 & Uthayasankar Sivarajah3 & Peter E. D. Love, 2019, Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies.
[41] Yunusa Simpa Abdulsalam and Mustapha Hedabou, 2020, Security and Privacy in Cloud Computing: Technical Review.
[42] Pinki Sharma and Jyotsna Sengupta, 2019, Survey of intrusion detection techniques and architectures in cloud computing.
[43] Ramzy Hamed Alhazmi & Uthman M. Ageeli, 2020, The Reality of Cloud Computing at Saudi Airlines Information Center: A Case Study.