•  
  •  
 

Document Type

Review

Abstract

The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. Many of the security solutions put out by researchers and organisations are unable to effectively handle numerous threats without going against the goals of cloud security. While security and privacy issues are frequently highlighted in the literature, there aren't many thorough technological answers available to successfully reduce these threats. However, studies that provide technological fixes often fall short of elucidating the underlying reasons of these security risks. This article discusses the necessity for adaptable security strategies that don't interfere with cloud security requirements, either present or future. It examines the body of research, assessing the potential and actual effects of suggested remedies on reducing recurrent risks. It also shows how security issues have weakened a lot of the models that are now in use. By adopting the STRIDE technique, the study investigates cloud security vulnerabilities from the user’s perspective. Additionally, it evaluates inefficient fixes and makes suggestions for building a more adaptable, safe cloud environment that can change to address new problems as they arise.

Receive Date

17/01/2025

Revise Date

12/04/2025

Accept Date

14/04/2025

Publication Date

7-9-2025

References

[1] Thushari P. Current security and privacy issues, and concerns of Internet of Things (IoT) and cloud computing: a review. In: International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). 7; 2022. p. 13e7. https://doi.org/10.1109/ICCCIS56430.2022.10037730.

[2] Islam S, Ouedraogo M, Kalloniatis C, Mouratidis H, Gritzalis S. Assurance of security and privacy requirements for cloud deployment models. In: IEEE Transactions on Cloud Computing; 2018. p. 387e400. https://doi.org/10.1109/ TCC.2015.2511719.

[3] Makkaoui K, Ezzati A, Beni-Hssane A, Motamed C. Cloud security and privacy model for providing secure cloud services. In: 2nd international conference on cloud computing technologies and applications (CloudTech); 2016. p. 81e6. https://doi.org/10.1109/CloudTech.2016.7847682.

[4] Sahin C, El Abbadi A. Data security and privacy for outsourced data in the cloud. In: 2018 IEEE 34th international conference on data engineering (ICDE), Paris, France. 11; 2018. p. 1731e4. https://doi.org/10.1109/ICDE.2018.00225.

[5] Tayal A, Bhatia G, Singh J, Bansal M, Anitha G. Security challenges and future privacy perspectives in cloud computing for smart city environments. In: International Conference on Power Energy, Environment & Intelligent Control (PEEIC), Greater Noida, India. 7; 2023. p. 473e7. https://doi.org/10.1109/PEEIC59336.2023.10451628.

[6] Aldawibi O, Sharf MA, Obaid MM. Cloud computing privacy: concept, issues and solutions. In: IEEE symposium on industrial electronics & applications (ISIEA). 3; 2022. p. 1e4. https://doi.org/10.1109/ISIEA54517.2022.9873688.

[7] Muhseen SAS, Elameer AS. A review in security issues and challenges on mobile cloud computing (MCC). In: 1st annual international conferenceoninformationandsciences(AiCIS); 2018. p. 133e9. https://doi.org/10.1109/AiCIS.2018.00035.

[8] Alwarafy A., Al-Thelaya K. A., Abdallah M., Schneider J., Hamdi M., A survey on security and privacy issues in edgecomputing-assisted internet of things. in IEEE Internet Things J. 8(6): 4004-4022. doi: 10.1109/JIOT.2020.3015432.

[9] Venkanna Babu MND, Naga Raja AS, Mallik PP, Chandra MJ, Kavitha S, Praveen Krishna AV. Data security analysis in cloud computing environment. In: 7th international conference on computing methodologies and communication (ICCMC); 2023. p. 1182e8. https://doi.org/ 10.1109/ICCMC56507.2023.10083547.

[10] Salve R, Paik S, Kalaskar P, Urunkar R, Sable S, William P. Analysis of the cloudlet's performance using machine learning with cloud management system. In: 4th international conference on computation, automation and knowledge management (ICCAKM). 01e05; 2023. https://doi.org/ 10.1109/ICCAKM58659.2023.10449634.

[11] Lourens M, Kaushik M, Goyal J, Singh R, Kuchhal S, Tiwari M. The role of implementing cloud computing technology for addressing critical security issues and overcoming the challenges effectively. In: 2022 2nd international conference on advance computing and innovative technologies in engineering (ICACITE); 2022. p. 2303e6. https://doi.org/ 10.1109/ICACITE53722.2022.9823892.

[12] Salve R, Paik S, Kalaskar P, Urunkar R, Sable S, William P. Analysis of the cloudlet's performance using machine learning with cloud management system. In: 4th international conference on computation, automation and knowledge management (ICCAKM); 2023. https://doi.org/10.1109/ ICCAKM58659.2023.10449634.

[13] Sudha I, Donald C, Navya S, Nithya G, Balamurugan M, Saravanan S. A secure data encryption mechanism in cloud using elliptic curve cryptography. In: International conference on intelligent and innovative technologies in computing, electrical and electronics (IITCEE); 2024. p. 1e5. https://doi.org/10.1109/IITCEE59897.2024.10467407.

[14] Koley S, Majumdar J, Bera MB, Acharjya PP. Multi-tenancy architecture for augmented security in cloud computing. In: 5th international conference on inventive research in computing applications (ICIRCA); 2023. p. 1090e4. https:// doi.org/10.1109/ICIRCA57980.2023.10220638.

[15] Singh J, Pasquier T, Bacon J H Ko, Eyers D. Twenty security considerations for cloud-supported internet of things. IEEE Internet Things J 2016;3(3):269e84. https://doi.org/10.1109/ JIOT.2015.2460333.

[16] Kilhoffer Z, Bashir M. Cloud privacy beyond legal compliance: an NLP analysis of certifiable privacy and security standards. IEEE Cloud Summit 2024:79e86. https://doi.org/ 10.1109/Cloud-Summit61220.2024.00020.

[17] Sharan B, Sagar AK, Chhabra M. A review on edgecomputing: challenges in security and privacy. In: International conference on applied artificial intelligence and computing (ICAAIC); 2022. p. 1280e6. https://doi.org/ 10.1109/ICAAIC53929.2022.9792868.

[18] Giehl A, Schneider P, Busch M, Schnoes F, Kleinwort R, Zaeh MF. Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs. In: 2019 12th CMI conference on cybersecurity and privacy (CMI); 2019. p. 1e6. https://doi.org/10.1109/CMI48017.2019. 8962138.

[19] Revathi P. Enhancing cloud communication security through forward secrecy algorithms. In: International conference on self sustainable artificial intelligence systems (ICSSAS); 2023. p. 1009e14. https://doi.org/10.1109/ICSSAS57918.2023. 10331634.

[20] Yin BLB, Rana ME. A critical review of cloud computing adoption, data security concerns, and impact in the healthcare landscape. In: ASU international conference in emerging technologies for sustainability and intelligent systems (ICETSIS); 2024. p. 1e7. https://doi.org/10.1109/ ICETSIS61505.2024.10459350.

[21] Sathishkumar G, Siva P, Joseph D, Santhosh R, Reshma R. Study on distributed multi-level security scheme for cloud computing. In: International conference on inventive computation technologies (ICICT); 2023. p. 1052e7. https:// doi.org/10.1109/ICICT57646.2023.10134363.

[22] Awaysheh F., Aladwan M. N., Alazab M., Alawadi S., Cabaleiro J. C., Pena T. F. Security by design for big data frameworks over cloud computing. in IEEE Trans Eng Manag. 69(6): 3676-3693. doi: 10.1109/TEM.2020.3045661.

[23] Begna G, Rawat DB, Garuba M, Njilla L. SecureCASH: securing context-aware distributed storage and query processing in hybrid cloud framework. In: IEEE conference on communications and network security (CNS); 2018. p. 1e2. https://doi.org/10.1109/CNS.2018.8433144.

[24] Al-Motwakel OA, Zahary AT. Ubiquitous computing and its security concerns. In: First international conference of intelligent computing and engineering (ICOICE); 2019. p. 1e16. https://doi.org/10.1109/ICOICE48418.2019.9035152.

[25] Tedeschi P, Sciancalepore S. Edge and fog computing in critical infrastructures: analysis, security threats, and research challenges. In: IEEE European symposium on security and privacy workshops (EuroS&PW); 2019. p. 1e10. https://doi.org/10.1109/EuroSPW.2019.00007.

[26] Alkhazali ARM, Khasawneh AM, Alzoubi S, Magableh M, Mohamed RR, Pandey B. Cloud computing in smart cities: privacy, ethical and social issues. In: International conference on computer science and emerging technologies (CSET); 2023. p. 10346675. 1e7. https://doi.org/10.1109/CSET58993.2023.

[27] Du W., Li A., Li Q., Zhou P., Privacy-preserving and secure cloud computing: a case of large-scale nonlinear programming. in IEEE Trans Cloud Comput. 11(1): 484-498. doi: 10.1109/TCC.2021.3099720.

[28] Kandukuri NR, Yadla M, Butool S, Shruthi T, Hasan N, Nikitha V. Analysis of cloud computing technology network software educational affairs human resources development process and its applications. In: 2024 international conference on science technology engineering and management (ICSTEM), Coimbatore, India; 2024. p. 1e6. https://doi.org/ 10.1109/ICSTEM61137.2024.10560553.

[29] Ali H, Abidin S, Alam M. Auditing of outsourced data in cloud computing: an overview. In: 2024 11th international conference on computing for sustainable global development (INDIACom), New Delhi, India; 2024. p. 111e7. https:// doi.org/10.23919/INDIACom61295.2024.10498177.

[30] Battula M. A systematic review on a multi-tenant database management system in cloud computing. In: 2024 international conference on cognitive robotics and intelligent systems (ICC- ROBINS), Coimbatore, India; 2024. p. 890e7. https://doi.org/10.1109/ICC-ROBINS60238.2024.10533959.

[31] M S, R. R. G K, Karthik S. Streamlining load scheduling in cloud computing: a thorough performance assessment and development of effective methods for design. In: 2024 international conference on advances in modern age technologies for health and engineering science (AMATHE), Shivamogga, India; 2024. p. 1e7. https://doi.org/10.1109/ AMATHE61652.2024.10582239.

[32] Fen LX, Ping TA. Cloud computing adoption among Malaysian SMEs manufacturers: the role of relative advantage, complexity and cybersecurity readiness. In: 2024 2nd international conference on software engineering and information technology (ICoSEIT), Bandung, Indonesia; 2024. p. 336e41. https://doi.org/10.1109/ICoSEIT60086.2024. 10497522.

[33] Maashi M. Elevating survivability in next-gen IoT-Fogcloud networks: scheduling optimization with the metaheuristic mountain gazelle algorithm. IEEE Trans Consum Electron 2024;70(1):3802e9. https://doi.org/10.1109/TCE.2024. 3371774.

[34] Supriyadi A, Anhar S, Farchani AY, Lutfiani N, Windiartono SN, Visiana Sihotang S. Fintechs role in asset management efficiency and economic growth in emerging markets. In: 2024 3rd international conference on creative communication and innovative technology (ICCIT), Tangerang, Indonesia; 2024. p. 1e7. https://doi.org/10.1109/ ICCIT62134.2024.10701165.

[35] Khan AA, Makmud MZH, Miskon MT, Nair A, Bidin K. Development of a weather station using IoT platform based arduino integrated with a control system for smart agriculture applications. In: 2024 IEEE international conference on automatic control and intelligent systems (I2CACIS) Shah Alam, Malaysia; 2024. p. 134e8. https://doi.org/10.1109/ I2CACIS61270.2024.10649832.

[36] Ebadinezhad S, Stanley KA, Mpia Engo G, Osemeha NK, Shoaib Mayar A. The impact of AI on traffic management and safety in the internet of vehicles through mobile edge computing. In: 2024 international conference on inventive computation technologies (ICICT), Lalitpur, Nepal; 2024. p. 319e26. https://doi.org/10.1109/ICICT60155.2024. 10544636.

[37] Sikarwar H, Das D. SecEdge: secure edge-computing-based hybrid approach for data collection and searching in IoV. IEEE Trans Network Serv Manag 2024;21(1):1213e25. https:// doi.org/10.1109/TNSM.2023.3299264.

[38] Zaoui C, Benabbou F. HAR data analysis: unveiling the potential of federated CNN models. In: 2024 4th international conference on innovative research in applied science, engineering and technology (IRASET), FEZ, Morocco; 2024. p. 1e7. https://doi.org/10.1109/IRASET60544.2024.10549264.

[39] Wairimu S, Iwaya LH, Fritsch L, Lindskog S. On the evaluation of privacy impact assessment and privacy risk assessment methodologies: a systematic literature review. IEEE Access 2024;12:19625e50. https://doi.org/10.1109/ACCESS. 2024.3360864.

[40] Li B, Song X, Li W, Wang L, Liu D. Application of security and privacy protection mechanisms in audio and video conference systems. In: 2024 international conference on telecommunications and power electronics (TELEPE), Frankfurt, Germany; 2024. p. 711e6. https://doi.org/10.1109/ TELEPE64216.2024.00133.

[41] Kafle K, Mandal P, Singh K, Andow B, Nadkarni A. Understanding the privacy practices of political campaigns: a perspective from the 2020 US election websites. In: 2024 IEEE symposium on security and privacy (SP), San Francisco, CA, USA; 2024. p. 3404e22. https://doi.org/10.1109/SP54263. 2024.00091.

[42] Yu X. Artificial intelligence security and privacy protection: a defense strategy for machine learning models. In: 2024 international conference on data science and network security (ICDSNS), Tiptur, India; 2024. p. 1e5. https://doi.org/ 10.1109/ICDSNS62112.2024.10690889.

[43] Yousif Raghad Z, Kareem Shahab W, Abdalwahid Shadan M. Enhancing approach for information security in hadoop. Polytech J 2020;10(1):14. v10n1y2020.pp81-87. https://doi.org/10.25156/ptj.

[44] Hassan Sardar KH, Daneshwar Muhammadamin A. Anomaly-based network intrusion detection system using deep intelligent technique. Polytech J 2023;12(2):11. https:// doi.org/10.25156/ptj.v12n2y2022.pp100-113.

[45] Noah N, Thakur S, Beck J, Das S. Evaluating privacy & security of online dating applications with a focus on older adults. In: 2024 IEEE European symposium on security and privacy workshops (EuroS&PW), Vienna, Austria; 2024. p. 666e77. 00081. https://doi.org/10.1109/EuroSPW61312.2024.

[46] Jena S, Brahma B, Khan Z, Jyothi G, Arunachalam P, Aggarwal S. SBB-Chi2-A2:Stacking of bagging-boosting with the blend Chi-square for effective prediction of aortic aneurysm using biomarker profiling. Int J Inf Technol 2025. https://doi.org/10.1007/s41870-024-02360-5.

[47] Banappagoudar SB, Khan Z, Thangam MMN, Dash B, Kalaivani M, Aggarwal S. TF-ViS-CvC: an automated transforming vision based cervical cancer screening with Pap smear analysis. Int J Inf Technol 2025. https://doi.org/ 10.1007/s41870-024-02336-5.

[48] Jaisinghani B, Aggarwal S. Comparative performance analysis of large language models in generative business intelligence: insights from Llama3 and BambooLLM. Int J Multidiscip Res 2024. https://doi.org/10.36948/ijfmr.2024. v06i06.33967.

[49] Aggarwal S, Aggarwal S. Deep Investment in Financial Markets using Deep Learning Models. Int J Comput Appl 2017. https://doi.org/10.5120/ijca2017913283.

[50] Aggarwal S. Investment analysis of index futures in financial markets using machine learning models. 2017. https:// doi.org/10.6084/M9.FIGSHARE.28190027.

[51] Aggarwal S. Comparative analysis of hedge funds in financial markets using machine learning models. Int J Comput Appl 2017 Apr;17. https://doi.org/10.5120/ijca2017913489.

[52] Abdullah AA, et al. NER-RoBERTa: Fine-Tuning RoBERTa for Named Entity Recognition (NER) within low-resource languages. arXiv preprint arXiv:2412.15252 2024.

[53] Asaad SM, MaghdidHS. A comprehensive review of indoor/ outdoor localization solutions in the IoT era. Comput Netw 2022;212:109041.

[54] Maghdid HS, et al. AI-enabled framework to diagnose COVID-19 using smartphone sensors. IEEE IRI Conference 2020:180e7.

[55] Singh SK, Virdee B, Aggarwal S, Maroju A. Incorporation of XAI and deep learning in biomedical imaging: A review. Polytech J 2025;15(1):1. https://doi.org/10.59341/2707-7799. 1845.

[56] Adekoya-Cole T, Fernando S, Maroju A, others. Building a dynamic opinion dashboard to categorize tweets for realtime sentiment analysis. Int J Inf Technol 2025. https:// doi.org/10.1007/s41870-025-02495-z.

Share

COinS