THE EVOLUTION OF CYBERSECURITYCHALLENGES AND MITIGATIONSTRATEGIES IN CLOUD COMPUTINGSYSTEMS
Keywords:
Cloud Security, Data Breaches, Insider Threats, Defense Mechanisms, Encryption, Cybersecurity, Advanced ThreatsAbstract
Cloud computing has emerged as a hot topic in the recent past, as most individuals seek scalable and flexible cloud solutions with unprecedented cost-optimization capabilities. However, this advancement has also brought so many different security issues onto the cloud, and thus, cloud environments are a fertile ground for cyber threats. This paper focuses on new trends in cloud security: APTs, insiders, data compromise, and DDoS attack threats. It goes deeper in exploring the features of these threats as well as the consequences that are sanctioned in cloud structures. Furthermore, the paper also undertakes an analysis of current-day countermeasures aimed at combating such threats. Measures such as zero trust architecture, encryption techniques, AI and ML in threat identification, and effective access control measures are analyzed for effectiveness when applied to cloud ecosystems. The following paper attempts to present an extensive analysis and overview of the threats and defense mechanisms associated with cloud computing and deliver the best strategies to cloud computing platforms. The results imply that there is a need to adapt security measures to the dynamic security threats evident in cloud computing
References
A. K. Sandhu, “Big data with cloud computing: Discussions and challenges,” Big Data Mining and Analytics, vol. 5, no. 1, pp. 32–40, Mar. 2022, doi: https://doi.org/10.26599/bdma.2021.9020016.
M. Sadeeq, N. M. Abdulkareem, S. R. M. Zeebaree, D. Mikaeel Ahmed, A. Saifullah Sami, and R. R. Zebari, “IoT and Cloud Computing Issues, Challenges and Opportunities: A Review,” Qubahan Academic Journal, vol. 1, no. 2, pp. 1–7, Mar. 2021, doi: https://doi.org/10.48161/qaj.v1n2a36.
L. Golightly, V. Chang, Q. A. Xu, X. Gao, and B. S. Liu, “Adoption of cloud computing as innovation in the organization,” International Journal of Engineering Business Management, vol. 14, no. 1, pp. 1–17, May 2022, doi: https://doi.org/10.1177/18479790221093992.
R. Zhang, “The impacts of cloud computing architecture on cloud service performance,” Journal of Computer Information Systems, pp. 1–9, Mar. 2018, doi: https://doi.org/10.1080/08874417.2018.1429957.
S. El Kafhali, I. El Mir, and M. Hanini, “Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing,” Archives of Computational Methods in Engineering, vol. 29, no. 1, Apr. 2021, doi: https://doi.org/10.1007/s11831-021-09573-y.
T. Ahanger and A. Aljumah, “Cyber Security Threats, Challenges and Defense mechanisms in Cloud Computing,” IET Communications, vol. 14, no. 7, Feb. 2020,
doi: https://doi.org/10.1049/iet-com.2019.0040.
H. Tabrizchi and M. K. Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” The Journal of Supercomputing, vol. 76, no. 12, pp. 9493–9532, Feb. 2020, doi: https://doi.org/10.1007/s11227-020-03213-1.
R. A. Nafea and M. Amin Almaiah, “Cyber Security Threats in Cloud: Literature Review,” IEEE Xplore, Jul. 01, 2021. https://ieeexplore.ieee.org/abstract/document/9491638
B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” IEEE Access, vol. 9, no. 1, pp. 1–1, 2021, doi: https://doi.org/10.1109/access.2021.3073203.
Kindervag, J. (2010). "No More Chewy Centers: Introducing the Zero Trust Model of Information Security." Forrester Research.
NIST. (2020). "Zero Trust Architecture." NIST Special Publication 800-207.