IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v14y2021i1p11-d711594.html
   My bibliography  Save this article

Security and Privacy in Cloud Computing: Technical Review

Author

Listed:
  • Yunusa Simpa Abdulsalam

    (DNA Lab, School of Computer and Communication Science, University Mohammed VI Polytechnic, Lot 660, Hay Moulay Rachid, Ben Guerir 43150, Morocco)

  • Mustapha Hedabou

    (DNA Lab, School of Computer and Communication Science, University Mohammed VI Polytechnic, Lot 660, Hay Moulay Rachid, Ben Guerir 43150, Morocco)

Abstract

Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist. This paper aims to introduce security and privacy issues that demand an adaptive solution approach without conflicting with existing or future cloud security. This paper reviews different works in the literature, taking into account its adaptiveness in mitigating against future reoccurring threats and showing how cloud security conflicts have invalidated their proposed models. The article further presents the security threats surrounding cloud computing from a user perspective using the STRIDE approach. Additionally, it provides an analysis of different inefficient solutions in the literature and offers recommendations in terms of implementing a secure, adaptive cloud environment.

Suggested Citation

  • Yunusa Simpa Abdulsalam & Mustapha Hedabou, 2021. "Security and Privacy in Cloud Computing: Technical Review," Future Internet, MDPI, vol. 14(1), pages 1-27, December.
  • Handle: RePEc:gam:jftint:v:14:y:2021:i:1:p:11-:d:711594
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/14/1/11/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/14/1/11/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chen, Yan & Zhang, Ruiqian & Lyu, Jiayi & Ma, Xin, 2024. "The butterfly effect of cloud computing on the low-carbon economy," Technological Forecasting and Social Change, Elsevier, vol. 204(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:14:y:2021:i:1:p:11-:d:711594. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.