Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffi...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Erbil Polytechnic University
2025-07-01
|
| Series: | Polytechnic Journal |
| Subjects: | |
| Online Access: | https://polytechnic-journal.epu.edu.iq/home/vol15/iss2/3 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. Many of the security solutions put out by researchers and organisations are unable to effectively handle numerous threats without going against the goals of cloud security. While security and privacy issues are frequently highlighted in the literature, there aren't many thorough technological answers available to successfully reduce these threats. However, studies that provide technological fixes often fall short of elucidating the underlying reasons of these security risks. This article discusses the necessity for adaptable security strategies that don't interfere with cloud security requirements, either present or future. It examines the body of research, assessing the potential and actual effects of suggested remedies on reducing recurrent risks. It also shows how security issues have weakened a lot of the models that are now in use. By adopting the STRIDE technique, the study investigates cloud security vulnerabilities from the user's perspective. Additionally, it evaluates inefficient fixes and makes suggestions for building a more adaptable, safe cloud environment that can change to address new problems as they arise. |
|---|---|
| ISSN: | 2707-7799 |