Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy

The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffi...

Full description

Saved in:
Bibliographic Details
Main Authors: Saurabh Aggarwal, Ashish Khanna, Abhilash Maroju
Format: Article
Language:English
Published: Erbil Polytechnic University 2025-07-01
Series:Polytechnic Journal
Subjects:
Online Access: https://polytechnic-journal.epu.edu.iq/home/vol15/iss2/3
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. Many of the security solutions put out by researchers and organisations are unable to effectively handle numerous threats without going against the goals of cloud security. While security and privacy issues are frequently highlighted in the literature, there aren't many thorough technological answers available to successfully reduce these threats. However, studies that provide technological fixes often fall short of elucidating the underlying reasons of these security risks. This article discusses the necessity for adaptable security strategies that don't interfere with cloud security requirements, either present or future. It examines the body of research, assessing the potential and actual effects of suggested remedies on reducing recurrent risks. It also shows how security issues have weakened a lot of the models that are now in use. By adopting the STRIDE technique, the study investigates cloud security vulnerabilities from the user's perspective. Additionally, it evaluates inefficient fixes and makes suggestions for building a more adaptable, safe cloud environment that can change to address new problems as they arise.
ISSN:2707-7799