Threats and Vulnerabilities of Cloud Computing: A Review

Authors

  • PS Suryateja CSE Dept., Vishnu Institute of Technology, Bhimavaram, India

DOI:

https://doi.org/10.26438/ijcse/v6i3.297302

Keywords:

Cloud Computing, Cloud Security, Cloud Threats, Cloud Vulnerabilities

Abstract

Cloud computing is a new frontier in computing technologies. It is well known for its pay-per-use model for billing customers and providing other features like elasticity, ubiquity, scalability, and availability of resources for businesses. Cloud computing provides delivery models like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) which can be utilized by various organizations to solve their data storage and processing needs. From recent surveys conducted by well known reputed cloud providers, it is apparent that more and more organizations and enterprises are moving their workloads to cloud. The top concern among the organizations to move their workloads or processes to cloud is security. Even though the security measures provided in cloud computing are evolving over the years, it still remains as a major challenge or obstacle. This paper provides an overview of numerous threats and vulnerabilities of cloud computing which can act as a guide to decision makers in organizations to evaluate the security in clouds.

References

K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," J. Internet Serv. Appl., vol. 4, no. 1, p. 5, 2013.

P. S. Suryateja, "A Comparative Analysis of Cloud Simulators," Int. J. Mod. Educ. Comput. Sci., vol. 8, no. 4, pp. 64–71, 2016.

Tripwire Top Cloud Security Threats - https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-threats/ (last accessed on Mar, 2018)

CSOonline Top Cloud Security Threats 2018 - https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html (last accessed on Mar, 2018)

Comparethecloud 8 Public Cloud Security Threats - https://www.comparethecloud.net/articles/8-public-cloud-security-threats-to-enterprises-in-2017/ (last accessed on Mar, 2018)

Tierpoint Top 5 Cloud Data Security Threats - https://www.tierpoint.com/top-5-cloud-data-security-threats-in-2018/ (last accessed on Mar, 2018)

Techtarget Five Cloud Security Threats to Combat in 2018 - http://searchcloudcomputing.techtarget.com/tip/Five-cloud-security-threats-to-combat-in-2018 (last accessed on Mar, 2018)

S. Bulusu, "A Study on Cloud Computing Security Challenges," 2012.

B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," Procedia - Procedia Comput. Sci., vol. 92, pp. 128–135, 2016.

N. Khan and A. Al-yasiri, "Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework," Procedia - Procedia Comput. Sci., vol. 94, pp. 485–490, 2016.

G. Somani, M. Singh, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing : Issues , taxonomy , and future directions," Comput. Commun., vol. 107, pp. 30–48, 2017.

B. Varghese and R. Buyya, "Next Generation Cloud Computing: New Trends and Research Directions," vol. 2017, no. September, pp. 1–22, 2017.

B.SriVarsha, P.S.Suryateja, "Using Advanced Encryption Standard for Secure and Scalable Sharing of personal Health Records in Cloud," International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5(6), 7745-7747, 2014.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i3.297302
Published: 2025-11-12

How to Cite

[1]
P. Suryateja, “Threats and Vulnerabilities of Cloud Computing: A Review”, Int. J. Comp. Sci. Eng., vol. 6, no. 3, pp. 297–302, Nov. 2025.

Issue

Section

Review Article