Survey on Cloud Computing Security

Authors

  • Fatima Ismail ALhadi Department of Information Technology, Faculty of Computer Science and IT, University of Sana’a, Sana’a, Yemen.
  • Nagi Ali AL-Shaibany Department of Information Technology, Faculty of Computer Science and IT, University of Sana’a, Sana’a, Yemen.
  • Sharaf Abdulhak AL-Homdyl Department of Information Technology, Faculty of Computer Science and IT, University of Sana’a, Sana’a, Yemen

DOI:

https://doi.org/10.59628/jast.v2i4.1025

Keywords:

Cloud Computing, Attacks, Security, Models, IDS, CIDS

Abstract

One of the most popular IT subfields today is cloud computing. With a simple Internet connection, it enables users to access cutting-edge information, technology, and infrastructure. Because of the numerous benefits offered, most international organizations have started to move toward cloud computing environments during the last few decades. Companies and organizations find cloud computing appealing because it eliminates the need to plan for provisioning and enables them to start with modest resources and progressively raise them as service demand increases. Cloud computing presents opportunities for research as well as obstacles. The security and privacy of data in cloud systems are important issues. Now that cloud computing technology is developing quickly, it is more convenient for businesses to move their workload there. It asks for a smaller investment and guarantees quick delivery of cutting-edge technologies. Cloud security is of the utmost importance. It is susceptible to cyberattacks that exploit its vulnerabilities in an insecure cloud environment. This puts the cloud environment’s assets, resources, and data in danger. In this paper, we reviewed some cloud computing studies about various attacks on cloud computing services. This paper’s main objective is to give readers a better understanding of security issues and solutions.

Downloads

Download data is not yet available.
Security Attacks on Cloud Services

Downloads

Published

2024-08-31

How to Cite

ALhadi, F. I., AL-Shaibany, N. A., & AL-Homdyl, S. A. (2024). Survey on Cloud Computing Security. Sana’a University Journal of Applied Sciences and Technology , 2(4), 381–390. https://doi.org/10.59628/jast.v2i4.1025

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.