2022
DOI: 10.1007/s11277-022-09960-z
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Threats and Solutions: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 61 publications
0
22
0
Order By: Relevance
“…While encryption was proposed as one solution to mitigate this it also requires trust that the CSP delivers the encryption and services as promised, if this cannot be guaranteed it is unlikely that an intelligence agency would even consider choosing a US-based CSP. While previous research (Alouffi et al, 2021;Balani & Varol, 2020;Bhajantri & Mujawar, 2019;Butt et al, 2022;Wulf et al, 2019) touched on the data security of information security it did so in more general terms and discussed data security broadly rather than its components which, considering the selection of previous research for this study is logical, as there are plenty of studies that discuss specific data security controls. CSP's capabilities such as the lack of interoperability and portability was found in previous research (Alouffi et al, 2021;El-Gazzar, 2014;Jones, 2015;Verma & Adhikari, 2020;Zwattendorfer et al, 2013), while the other challenges found by this study such as CSPs' ability to provide information security solutions are new.…”
Section: Discussionmentioning
confidence: 99%
“…While encryption was proposed as one solution to mitigate this it also requires trust that the CSP delivers the encryption and services as promised, if this cannot be guaranteed it is unlikely that an intelligence agency would even consider choosing a US-based CSP. While previous research (Alouffi et al, 2021;Balani & Varol, 2020;Bhajantri & Mujawar, 2019;Butt et al, 2022;Wulf et al, 2019) touched on the data security of information security it did so in more general terms and discussed data security broadly rather than its components which, considering the selection of previous research for this study is logical, as there are plenty of studies that discuss specific data security controls. CSP's capabilities such as the lack of interoperability and portability was found in previous research (Alouffi et al, 2021;El-Gazzar, 2014;Jones, 2015;Verma & Adhikari, 2020;Zwattendorfer et al, 2013), while the other challenges found by this study such as CSPs' ability to provide information security solutions are new.…”
Section: Discussionmentioning
confidence: 99%
“…Despite the fact that there have been numerous surveys that explore various aspects of security (such as requirements, challenges, and solutions) in the cloud [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36], there have been none that focus on security from the perspective of cloud-native services. In fact, although these two terms are closely related, there are some distinct differences.…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1 shows a typical cloud computing architecture. The importance of cloud security cannot be overstated, as the consequences of security breaches can be severe, including data loss, privacy violations, financial damages, and erosion of user trust [9], [10]. Furthermore, the dynamic and scalable nature of cloud services complicates the task of ensuring consistent security across different service models (Infrastructure as a Service, Platform as a Service, and Software as a Service) and deployment models (public, private, and hybrid clouds).…”
Section: Introductionmentioning
confidence: 99%