Security Concerns and Solutions for Enterprise Cloud Computing Applications

Arjun Reddy Kunduru *

ERP Analysts Inc., Orlando, FL, USA.

*Author to whom correspondence should be addressed.


Abstract

Computing in the cloud is now one of the most interesting developments in technology owing to the fact that it is both flexible and cost-effective. Despite the enormous stakes, the implementation of cloud computing into an existing business model creates significant safety risks. Enterprises need to foresee and account for possible risks, threats, vulnerabilities, and mitigation strategies before using cloud computing. The concept of cloud computing may be simplified by dividing it into three separate models: "Infrastructure as a Service," "Software as a Service," and "Platform as a Service." It also talks about the current crop of cloud-based security tools. Before using this technology, we think businesses should assess their security risks, threats, and existing defences. We’ve also discussed the advantages and drawbacks of cloud computing as well as places where it might be used for information risk management.

Keywords: Enterprise cloud computing, security risks, SaaS, implementation of cloud security


How to Cite

Kunduru , A. R. (2023). Security Concerns and Solutions for Enterprise Cloud Computing Applications. Asian Journal of Research in Computer Science, 15(4), 24–33. https://doi.org/10.9734/ajrcos/2023/v15i4327

Downloads

Download data is not yet available.

References

Kazim M, Zhu SY. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications. 2015; 6(3):109-113.

Singh S, Jeong YS, Park JH. A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications. 2016;75:200-222.

Parekh MDH, Sridaran R. An analysis of security challenges in cloud computing. International Journal of Advanced Computer Science and Applications. 2013; 4(1).

Anderson J. The anatomy of a data breach. Journal of Accountancy; 2019 Available:https://www.journalofaccountancy.com/news/2019/jul/data-breach-anatomy.html

Ponemon Institute. Cost of a Data Breach Report. IBM Security; 2021 Available:https://www.ibm.com/security/data-breach

Ertaul L, Singhal S, Saldamli G. Security challenges in cloud computing. In Security and Management. 2010;36-42. Available:https://www.cobalt.io/blog/what-is-denial-of-service-attack

Singh A, Chatterjee K. Cloud security issues and challenges: A survey. Journal of Network and Computer Applications. 2017;79:88-115.

Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB. An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 20134, 1-13.

Suryateja PS. Threats and vulnerabilities of cloud computing: A review. International Journal of Computer Sciences and Engineering. 2018;6(3):297-302.

Alani MM. Securing the cloud: Threats, attacks and mitigation techniques. Journal of Advanced Computer Science & Technology. 2014;3(2):202.

Subramanian N, Jeyaraj A. Recent security challenges in cloud computing. Computers & Electrical Engineering. 2018; 71:28-42.

Lee K. Security threats in cloud computing environments. International Journal of Security and Its Applications. 2012;6(4): 25-32.

Malik A, Nazir MM. Security framework for cloud computing environment: A review. Journal of Emerging Trends in Computing and Information Sciences. 2012;3(3):390-394.

Zhang Q, Cheng L, Boutaba R. Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications. 2022;13(1):1-28.

Li B, Liu J, Wu J, Li C. Dynamic pricing for cost optimization in cloud computing: A survey. Journal of Systems Architecture. 2021;112:101981.

Kumar S, Khatri SK, Garg S. Security and privacy issues in cloud computing: A systematic literature review. Future Generation Computer Systems. 2019;94: 962-977.

Chouhan P, Singh R. Security attacks on cloud computing with possible solution. International Journal of Advanced Research in Computer Science and Software Engineering. 2016;6(1).

Ashktorab V, Taghizadeh SR. Security threats and countermeasures in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM). 2012;1(2):234- 245.

Edwards J. Gartner: Seven cloud-computing security risks. CIO; 2009 Available:https://www.cio.com/article/2429864/gartner--seven-cloud-computing-security-risks.html

Shahzad F. State-of-the-art survey on cloud computing security challenges, approaches and solutions. Procedia Computer Science. 2014;37:357-362.

Piplode R, Singh UK. An overview and study of security issues & challenges in cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering. ISSN. 2012; 2277.

Xiao Z, Xiao Y. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials. 2012;15(2):843- 859.

Barron C, Yu H, Zhan J. Cloud computing security case studies and research. In Proceedings of the World Congress on Engineering. 2013;2(2):1-6.

Jain P, Jaiswal A. Security Issues and their solution in cloud computing. International Journal of Computing & Business Research. 2012;2229-6166.

Srinivasamurthy S, Liu DQ. Survey on cloud computing security. In Proc. Conf. on Cloud Computing, Cloud Com. 2010;10.

Gupta S, Kumar P. Taxonomy of cloud security. Int. J. Comput. Sci. Eng. Appl. 2013;3(5):47-67.