Systematic Review on Cloud Security
Systematic Review on Cloud Security
https://www.scirp.org/journal/jis
ISSN Online: 2153-1242
ISSN Print: 2153-1234
Sina Ahmadi
Keywords
Cloud Security, Threat Analysis, Mitigation Strategies, Emerging Trends, Ethical
Considerations, Data Analysis
1. Introduction
The utilization of cloud computing is increasing daily in information technolo-
gy, providing organizations worldwide with cost-efficiency, scalability, and a
high level of flexibility. When organizations integrate cloud computing into their
network, it is essential to focus on cloud security, a collection of security meas-
ures specially designed to protect cloud-based infrastructure, data, and applica-
tions. These measures aim to ensure the authentication of devices and users, da-
ta privacy protection, and data and resource access control. With the shift of
businesses towards cloud-based operations, the security of sensitive data be-
comes essential [1]. However, cloud computing presents inherent security chal-
lenges, which makes it necessary to understand effective mitigation strategies
and potential threats. This systematic literature review aims to determine the
current state of information regarding cloud computing security, which primar-
ily focuses on identifying threats and evaluating mitigation strategies.
Cloud services have revolutionized how organizations store, process, and
access data. However, this shift has created several challenges, such as unautho-
rized access and data breaches, which have an impact on data availability, integr-
ity, and confidentiality. Organizations must understand these threats and ac-
quire knowledge on how to develop defensive strategies in order to utilize a se-
cure cloud network. This research reviews several scholarly articles and papers to
provide a detailed overview of significant security threats in cloud computing. It
also includes human-related risks and technical vulnerabilities and evaluates ex-
isting mitigation strategies. Thus, this systematic research contributes to a dee-
per understanding of cloud computing. The primary objective of this research
study is to identify cloud security threats and evaluate the efficiency of different
mitigation strategies employed by organizations to address these threats. This
research study also aims to explore emerging trends like ML, AI, containeriza-
tion, and serverless computing. It assesses shared responsibility models, ethical
considerations, user awareness, cloud computing and data security as shown in
Figure 1.
2. Literature Review
2.1. Common Threats to Cloud Computing Security
Cloud computing is susceptible to numerous prevalent threats. This is because it
is an entirely technology-based platform, making it susceptible to potential cyber
threats at any given moment. For instance, data breaches are prevalent in this
case. They result in unauthorized access to data or data theft. Furthermore, data
breaches expose an organization’s private information, which results in adverse
reputational and financial outcomes. A prior study [3] was conducted in this re-
gard. According to the researchers, data breaches force companies to implement
strict security measures to protect data. Malware attacks are also widespread in
this regard. These attacks include using software that hacks the cloud server and
steals all the desired data. Another study [4] researched the prediction of such
attacks using machine learning. This is a great technique that tech companies
can use to secure their data.
Account hijacking has also become a common practice in cloud computing. It
is mainly used in identity theft schemes. In this case, the attacker uses a person’s
private information to conduct any other unauthorized or suspicious activity.
Usually, compromised email accounts are used to impersonate a person. A prior
study [5] on this issue proposed prevention strategies. In this case, it is impor-
tant to encrypt data and private information. Lastly, DDoS attacks are also
common in cloud computing. According to [6], these attacks aim to disrupt the
regular working of a company’s system by enhancing traffic on it. They can be
very harmful to a company’s reputation.
IAM is another common technique used in this regard. According to [9], IAM
controls access to services and resources inside the cloud environment based on
the least privilege principle. It allows only authorized users to access private data.
The efficiency of IAM strategies in controlling user access can be represented
by Equation (2) [5].
Number of Authorized Access Requests
Access Control Efficiency = × 100% (2)
Total Number of Access Requests
Furthermore, SIEM solutions are used in cloud computing for data protec-
tion. According to [10], these solutions analyze the data of a security event using
different sources in the cloud. By doing so, they help gain real-time information
about the company’s security situation. Another technique, according to Sasu-
buili and Venkateswarlu (2021), is vulnerability management. It mainly includes
identifying and mitigating security vulnerabilities in a cloud environment. This
measure significantly mitigates the risk of attacks.
The capability of SIEM solutions for early threat detection can be measured
using the Formula (3) [7].
Number of Detected Threats
Detection Rate = × 100% (3)
Total Number of Threats
PRA can help evaluate the effectiveness of the methods used in identifying and
mitigating cloud security threats. It is a quantitative technique that calculates the
likelihood of security issues. Another example is an e-commerce company mi-
grating its customer database to the cloud. In this case, PRA reveals that the like-
lihood of a data breach due to insecure API endpoints is 70%. The organizations
can allocate resources to strengthen API security measures by determining the
probability of this specific threat. Bayesian networks are also employed for this
purpose. They include graphical models that show the dependencies between
different variables within the cloud. Several studies [18] also investigated the uti-
lization of these networks for risk assessment. It was found that they can help
show the complicated links between threats and the employed mitigation strate-
gies. For example, a software development company using cloud infrastructure
for code repositories employs Bayesian networks to model dependencies be-
tween software vulnerabilities and deployment configurations. By accurately
predicting 80% of security incidents, the organization identifies critical vulnera-
bilities early in the development lifecycle, reducing the risk of exploitation in
production environments.
Queuing theory is another important model that can be used to analyze miti-
gation strategies. This theory is used to understand the behavior of cloud re-
sources under various workload conditions. This helps in assessing their per-
formance in response to security threats. For example, a queuing theory model
was developed to study the effectiveness of cloud applications in the healthcare
industry [19]. It was found that the queuing theory helps a company improve its
resource allocation processes and capacity planning to overcome the impact of
security threats. Currently, game theory is being used to assess cloud security
measures. This theory helps in understanding the links between defenders and
attackers within the cloud. According to [20], this theory can be used by compa-
nies to create efficient defense mechanisms and improve their cloud security
measures. The utilization of mathematical models greatly enhances the effec-
tiveness of cloud security measures.
Table 1 shows the mathematical models that help quantitatively analyze cur-
rent mitigation strategies used in cloud security.
Probabilistic Risk Evaluates the effectiveness of identifying Number of Identified Threats PRA Score = (25/30) *
× 100%
Assessment (PRA) and mitigating security threats Total Number of Threats 10 = 8.3
Queuing Theory
Queuing Theory Analyzes cloud resource behavior under Number of Improved Processes
× 100% Effectiveness = (9/10)
Analysis workload conditions Total Number of Processes
* 10 = 9.0
Bayesian Network
Bayesian Network Identifies dependencies between Number of Accurate Predictions
× 100% Score = (35/40) * 10
Analysis variables in cloud environments Total Number of Predictions
= 8.75
3. Problem Definition
In this digital world, cloud computing is gaining increasing adoption as it offers
scalability and flexibility for organizations. This transition has provided several
benefits and security challenges, necessitating the protection of the cloud storage
system. Several solutions are already available to deal with such security threats,
such as the shared responsibility model and emerging technologies, to promptly
mitigate risks associated with human errors. However, it is imperative to pri-
oritize advanced threats and employ mitigation strategies to adequately protect
and preserve the cloud system.
This research investigates the evolving landscape of cloud security by empha-
sizing key challenges, such as the dynamic threat environment and complexities
within the shared responsibility paradigm. The study aims to contribute to ex-
isting literature by focusing on these issues, informing strategies for mitigating
cloud security risks and developing a more resilient security posture in
cloud-based environments.
played an essential role in changing how applications are developed and dep-
loyed in cloud environments. In addition, these technologies come with a high
level of agility, making them helpful for organizations to deal with security chal-
lenges. For instance, containers are significant in bridging the risk of vulnerabili-
ties and misconfigurations, which attackers may exploit. Moreover, serverless
computing raises concerns regarding the secure processing and storage of data.
Thus, there is a great need to understand the risks and characteristics of emerg-
ing technologies if traditional security measures are being adopted.
4. Methodology/Approach
4.1. Research Design
This study used a qualitative research design to analyze and synthesize existing
studies, such as research papers and scholarly articles on cloud computing secu-
rity. The qualitative research method explored the nature of cloud security
threats and mitigation strategies. This approach involved carefully selecting
scholarly articles and other research studies published between 2020 and 2024.
The objective was to identify several significant threats and evaluate mitigation
strategies. Additionally, this approach provides insights regarding the effective-
ness and limitations of existing security measures in cloud-based networks. This
study utilized a qualitative research design to analyze existing studies on cloud
computing security. While qualitative research offers valuable insights into the
nature of threats and mitigation strategies, it is subject to biases inherent in the
interpretation of data.
based on which the literature review was conducted. The purpose of creating
themes was to extract meaningful patterns and insights from the selected re-
search studies. First, the literature was organized into relevant themes based on
the topics identified in the data—the thematic analysis aimed to identify emerg-
ing trends in cloud computing security and threats and mitigation strategies.
Subsequently, the findings of all the research studies were summarized and syn-
thesized to extract useful and up-to-date information that could provide insights
into cloud security.
pared for imminent threats. Data breaches, account hijacking, and DDoS threats
collectively show a dynamic challenge that requires the adoption of solid security
measures. Understanding these challenges becomes essential to developing
countermeasures as cloud technology advances. Thus, through a thorough anal-
ysis of these threats, organizations can design their security measures to decrease
the risks, which ensures a reliable and secure cloud system. Some common cloud
security threats are shown in Figure 3.
to unauthorized users. This security measure confirms that in the event an un-
authorized user gains access, they will be unable to read the sensitive informa-
tion. In addition, given these existing vulnerabilities, effective management is
equally essential. It involves a systematic approach to identifying and solving the
substantial flaws in the cloud system prior to their exploitation by hackers. This
strategy involves regular security checks, removing weaknesses, and staying in-
formed of imminent threats. By prioritizing these crucial protections, organiza-
tions can enhance their reliability against the effects of data breaches and create
a more secure cloud system.
and available [30]. These attacks send traffic to the system and block actual us-
ers. Organizations use strategies, such as traffic filtering and irregularity detec-
tion, to deal with these situations. They also create a scalable structure and use
content delivery networks to spread traffic. Some organizations apply specialized
DDoS protection services. Monitoring traffic on the network can help organiza-
tions detect and address attacks early. It is also essential to have a plan for when
attacks happen. Thus, by applying this step, organizations can reduce DDoS at-
tacks, which keeps their services running smoothly for every user. Traffic filter-
ing is also vital to dealing with DDoS attacks. It functions by stopping bad traffic
and allowing good traffic to proceed. Organizations use tools like firewalls and
intrusion prevention systems to check upcoming data. The main advantage of
this tool is that it prevents lousy traffic from flooding the network. Load balanc-
ing also plays a vital role in this situation. It distributes traffic across multiple
servers, thereby preventing server congestion and downtime. This ensures the
continuity of services even during the attacks. Using these strategies, any organ-
ization can handle DDoS attacks more professionally. It ensures that their cloud
services run smoothly without any disturbance in the network. Thus, any organ-
ization can stay protected from DDoS attacks by filtering the traffic and balanc-
ing the load. Figure 4 shows DDoS mitigation strategies.
suspicious activities [33]. This culture follows security protocols and is integral
to maintaining a secure cloud network. Thus, such training programs are not
only for enhancing the knowledge of individuals but also to develop a sense of
shared commitment to cybersecurity and help the organization deal with poten-
tial security threats.
The impact of security awareness training on reducing human errors can be
quantified using formula (5) [31].
Error Reduction
Initial Number of Security − related Errors − Final Number of Errors (5)
= × 100%
Initial Number of Security − related Errors
6. Conclusion
This systematic literature review evaluation on cloud computing security aims to
determine adequate security measures to mitigate evolving threats quickly. The
qualitative analysis highlights critical threats, including malware attacks and data
breaches, emphasizing the need for encryption techniques, user awareness train-
ing, SIEM, and IAM. Some emerging trends in cloud computing security, such
as AI and containerization, are also mentioned in this research. Moreover, ethi-
cal considerations and the shared responsibility model are essential in ensuring
adequate security measures. The findings from the literature review guide effec-
tive cloud security practices. In addition, this research highlights areas that fu-
ture researchers should consider to protect the confidentiality and integrity of
cloud-based systems.
7. Future Scope
The future scope of research in cloud computing security presents an exciting
landscape filled with opportunities to address emerging challenges and advance
the effectiveness of mitigation strategies. As technology evolves, several critical
avenues merit exploration for researchers and practitioners. First, the advent of
quantum computing introduces a novel dimension to cloud security. Research-
ers can delve into developing encryption methods specifically designed to with-
stand the computational capabilities of quantum machines. Understanding and
mitigating the potential threats posed by quantum computing will be crucial to
ensuring the long-term security of cloud environments. The proliferation of hy-
brid and multi-cloud architectures calls for focused attention in future research.
Investigating security solutions that seamlessly integrate across diverse cloud
platforms can enhance the overall resilience of organizations. Addressing the
unique challenges of maintaining consistent security measures in hybrid and
multi-cloud setups will ensure robust protection against evolving threats.
Given the increasing popularity of AI and ML applications, their role in en-
hancing cloud security deserves exploration. Future research could focus on re-
fining AI/ML algorithms to bolster threat detection capabilities and provide
more adaptive and responsive security solutions. Understanding the synergy
between AI/ML and traditional security measures will be essential in developing
comprehensive defense mechanisms. Additionally, the human element remains
a critical factor in cloud security, and future research should emphasize strate-
gies to fortify this aspect further. Developing innovative approaches to enhance
user awareness and education programs can minimize the risk of human error
and foster a security-conscious culture within organizations. Furthermore, the
regulatory landscape governing cloud security is evolving. Future research could
delve into the implications of emerging regulations and standards, ensuring that
security practices align with compliance requirements. This includes examining
how regulatory frameworks influence security policies and practices within
cloud environments.
Conflicts of Interest
The author declares no conflicts of interest regarding the publication of this pa-
per.
References
[1] Vinoth, S., Vemula, H.L., Haralayya, B., Mamgain, P., Hasan, M.F. and Naved, M.
(2022) Application of Cloud Computing in Banking and e-Commerce and Related
Security Threats. Materials Today: Proceedings, 51, 2172-2175.
https://doi.org/10.1016/j.matpr.2021.11.121
[2] Kurt, E. (2022) Cloud Computing and Data Security.
https://ekremkurt1907.medium.com/cloud-computing-and-data-security-cdce9745
ab09
[3] Chen, D., Chowdhury, M.M. and Latif, S. (2021) Data Breaches in Corporate Set-
ting. 2021 International Conference on Electrical, Computer, Communications and
Mechatronics Engineering (ICECCME), Mauritius, 7-8 October 2021, 1-6.
https://doi.org/10.1109/ICECCME52200.2021.9590974
[4] Patel, V., Choe, S. and Halabi, T. (2020) Predicting Future Malware Attacks on
Cloud Systems Using Machine Learning. IEEE 6th International Conference on Big
Data Security on Cloud, Baltimore, 25-27 May 2020, 151-156.
https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00036
[5] Lokuge, K. (2020) Security Concerns in Cloud Computing: A Review.
https://www.researchgate.net/publication/346606684_Security_Concerns_in_Cloud
_Computing_A_Review
[6] Srinivasan, K., Mubarakali, A., Alqahtani, A.S. and Dinesh Kumar, A. (2020) A
Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection
and Mitigation Techniques. In: Balaji, S., Rocha, Á. and Chung, Y.-N., Eds., Intelli-
gent Communication Technologies and Virtual Mobile Networks, Springer, Berlin,
252-270. https://doi.org/10.1007/978-3-030-28364-3_24
[7] Seth, B., Dalal, S., Jaglan, V., Le, D.N., Mohan, S. and Srivastava, G. (2022) Inte-
grating Encryption Techniques for Secure Data Storage in the Cloud. Transactions
on Emerging Telecommunications Technologies, 33, e4108.
[8] Ashtari, H. (2021) What Is Cloud Encryption? Definition, Importance, Methods,
and Best Practices.
https://www.spiceworks.com/tech/cloud/articles/what-is-cloud-encryption/
[9] Olabanji, S.O., Olaniyi, O.O., Adigwe, C.S., Okunleye, O.J. and Oladoyinbo, T.O.
(2024) AI for Identity and Access Management (IAM) in the Cloud: Exploring the
Potential of Artificial Intelligence to Improve User Authentication, Authorization,
and Access Control within Cloud-Based Systems. Asian Journal of Research in
Computer Science, 17, 38-56. https://doi.org/10.9734/ajrcos/2024/v17i3423
[10] Sasubilli, M.K. and Venkateswarlu, R. (2021) Cloud Computing Security Challenges,
Threats and Vulnerabilities. 6th International Conference on Inventive Computation
Technologies, Coimbatore, 20-22 January 2021, 476-480.
https://doi.org/10.1109/ICICT50816.2021.9358709
[11] Bentaleb, O., Belloum, A.S., Sebaa, A. and El-Maouhab, A. (2022) Containerization
Technologies: Taxonomies, Applications and Challenges. The Journal of Super-
computing, 78, 1144-1181. https://doi.org/10.1007/s11227-021-03914-1
[12] Kelly, D., Glavin, F. and Barrett, E. (2020) Serverless Computing: Behind the Scenes
of Major Platforms. IEEE 13th International Conference on Cloud Computing
(CLOUD), Beijing, 19-23 October 2020, 304-312.
https://doi.org/10.1109/CLOUD49709.2020.00050
[13] Rath, M., Satpathy, J. and Oreku, G.S. (2021) Artificial Intelligence and Machine
Learning Applications in Cloud Computing and Internet of Things. In: Kaur, G.,
Tomar, P. and Tanque, M., Eds., Artificial Intelligence to Solve Pervasive Internet of
Things Issues, Elsevier, Amsterdam, 103-123.
https://doi.org/10.1016/B978-0-12-818576-6.00006-X
[14] Abidin, S., Swami, A., Ramirez-Asís, E., Alvarado-Tolentino, J., Maurya, R.K. and
Hussain, N. (2022) Quantum Cryptography Technique: A Way to Improve Security
Challenges in Mobile Cloud Computing (MCC). Materials Today: Proceedings, 51,
508-514. https://doi.org/10.1016/j.matpr.2021.05.593
[15] Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H. and Ayaz, M. (2021)
[31] Pontes, D. (2021, June 30) Automated, Accurate, Flexible DDoS Detection and Mi-
tigation.
https://www.kentik.com/blog/automated-accurate-flexible-ddos-detection-and-miti
gation/
[32] Singh, C., Thakkar, R. and Warraich, J. (2023) IAM Identity Access Management—
Importance in Maintaining Security Systems within Organizations. European Jour-
nal of Engineering and Technology Research, 8, 30-38.
https://doi.org/10.24018/ejeng.2023.8.4.3074
[33] Tuyishime, E., Balan, T.C., Cotfas, P.A., Cotfas, D.T. and Rekeraho, A. (2023) En-
hancing Cloud Security—Proactive Threat Monitoring and Detection Using a
SIEM-Based Approach. Applied Sciences, 13, Article No. 12359.
https://doi.org/10.3390/app132212359
[34] Mohanan, R. (2022) What Is Security Information and Event Management (SIEM)?
Definition, Architecture, Operational Process, and Best Practices.
https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is
-siem/