Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy

The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffi...

Full description

Saved in:
Bibliographic Details
Main Authors: Saurabh Aggarwal, Ashish Khanna, Abhilash Maroju
Format: Article
Language:English
Published: Erbil Polytechnic University 2025-07-01
Series:Polytechnic Journal
Subjects:
Online Access: https://polytechnic-journal.epu.edu.iq/home/vol15/iss2/3
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849230233996099584
author Saurabh Aggarwal
Ashish Khanna
Abhilash Maroju
author_facet Saurabh Aggarwal
Ashish Khanna
Abhilash Maroju
author_sort Saurabh Aggarwal
collection DOAJ
description The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. Many of the security solutions put out by researchers and organisations are unable to effectively handle numerous threats without going against the goals of cloud security. While security and privacy issues are frequently highlighted in the literature, there aren't many thorough technological answers available to successfully reduce these threats. However, studies that provide technological fixes often fall short of elucidating the underlying reasons of these security risks. This article discusses the necessity for adaptable security strategies that don't interfere with cloud security requirements, either present or future. It examines the body of research, assessing the potential and actual effects of suggested remedies on reducing recurrent risks. It also shows how security issues have weakened a lot of the models that are now in use. By adopting the STRIDE technique, the study investigates cloud security vulnerabilities from the user's perspective. Additionally, it evaluates inefficient fixes and makes suggestions for building a more adaptable, safe cloud environment that can change to address new problems as they arise.
format Article
id doaj-art-7477e1d62ae743ac8564f167d0ed4278
institution Kabale University
issn 2707-7799
language English
publishDate 2025-07-01
publisher Erbil Polytechnic University
record_format Article
series Polytechnic Journal
spelling doaj-art-7477e1d62ae743ac8564f167d0ed42782025-08-21T08:07:17ZengErbil Polytechnic UniversityPolytechnic Journal2707-77992025-07-01152137147https://doi.org/10.59341/2707-7799.1858Comprehensive Review on Facets of Cloud Computing in Context of Security and PrivacySaurabh Aggarwal0Ashish Khanna1Abhilash Maroju2San Jose State University, USADepartment of Computer Science, Maharaja Agrasen Institute of Technology, Delhi, IndiaResearch Graduate, Department of Information Technology, University of the Cumberlands, USAThe advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. Many of the security solutions put out by researchers and organisations are unable to effectively handle numerous threats without going against the goals of cloud security. While security and privacy issues are frequently highlighted in the literature, there aren't many thorough technological answers available to successfully reduce these threats. However, studies that provide technological fixes often fall short of elucidating the underlying reasons of these security risks. This article discusses the necessity for adaptable security strategies that don't interfere with cloud security requirements, either present or future. It examines the body of research, assessing the potential and actual effects of suggested remedies on reducing recurrent risks. It also shows how security issues have weakened a lot of the models that are now in use. By adopting the STRIDE technique, the study investigates cloud security vulnerabilities from the user's perspective. Additionally, it evaluates inefficient fixes and makes suggestions for building a more adaptable, safe cloud environment that can change to address new problems as they arise. https://polytechnic-journal.epu.edu.iq/home/vol15/iss2/3cloud computing security,privacy concerns,adaptive security solutions,stride approach,threat mitigation
spellingShingle Saurabh Aggarwal
Ashish Khanna
Abhilash Maroju
Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
Polytechnic Journal
cloud computing security,
privacy concerns,
adaptive security solutions,
stride approach,
threat mitigation
title Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
title_full Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
title_fullStr Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
title_full_unstemmed Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
title_short Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
title_sort comprehensive review on facets of cloud computing in context of security and privacy
topic cloud computing security,
privacy concerns,
adaptive security solutions,
stride approach,
threat mitigation
url https://polytechnic-journal.epu.edu.iq/home/vol15/iss2/3
work_keys_str_mv AT saurabhaggarwal comprehensivereviewonfacetsofcloudcomputingincontextofsecurityandprivacy
AT ashishkhanna comprehensivereviewonfacetsofcloudcomputingincontextofsecurityandprivacy
AT abhilashmaroju comprehensivereviewonfacetsofcloudcomputingincontextofsecurityandprivacy