Submitted:
17 July 2023
Posted:
18 July 2023
You are already at the latest version
Abstract
Keywords:
Introduction:
Methods and Materials:
Results:
- A.
- Identified challenges and mitigation techniques from SRL
- B.
- Future challenges and mitigation techniques from Survey
Discussion:
Conclusion:
Appendix A. List of identified challenges in CC and compromised attribute extracted from SLR
| No. | Challenges | Compromised attribute | No. | Challenges | Compromised attribute |
| 1 | WS- Security | Integrity, Confidentiality | 23 | Perceived Lack of Reliability | Availability |
| 2 | Phishing attack | Confidentiality | 24 | Auditing | Security, Confidentiality |
| 3 | Wrapping attack | Integrity | 25 | Back-Door | Usability |
| 4 | Injection attack | Availability | 26 | TCP Hijacking | Confidentiality, Integrity |
| 5 | IP Spoofing | Confidentiality | 27 | Social Engineering | Confidentiality |
| 6 | Tampering | Integrity | 28 | Dumpster Diving | Availability |
| 7 | Repudiation | Auditability | 29 | Password Guessing | Confidentiality |
| 8 | Information Disclosure | Confidentiality | 30 | Trojan Horses and Malware | Usability |
| 9 | Denial of service | Availability | 31 | Completeness | Availability |
| 10 | Elevation of privilege | Confidentiality | 32 | Roll back attack | Availability, Usability |
| 11 | Physical security | Security, Availability | 33 | Fairness | Confidentiality |
| 12 | WLAN’s security | Usability, Accountability | 34 | Data Loss or Leakage | Availability |
| 13 | Direct attacking method | Confidentiality | 35 | Computer network attack | Confidentiality, Integrity |
| 14 | Replay attack | Integrity | 36 | Denial of service attack | Availability |
| 15 | Man-in-the-middle attack | Availability, Integrity | 37 | Data security | Integrity, Security |
| 16 | Reflection attack | Confidentiality | 38 | Network security | Integrity, Security |
| 17 | Interleaving attack | Integrity, Confidentiality | 39 | Data locality | Reliability |
| 18 | Timelines attack | Usability, Availability | 40 | Data integrity | Integrity |
| 19 | Self-adaptive storage resource management | Integrity, Confidentiality | 41 | Data segregation | Security, Confidentiality |
| 20 | Client monitoring and security | Security | 42 | Backup | Availability |
| 21 | Lack of trust | Confidentiality | 43 | Data manipulation | Availability, Integrity |
| 22 | Weak Service Level Agreements (SLAs) | Availability, Confidentiality |
Appendix B. List of security techniques and their impact extracted from SLR
| No. | Security technique | Impact |
| 1 | Identity-Based Authentication(IBA) | Privacy, Security |
| 2 | RSA algorithm | Security, Efficiency |
| 3 | Dynamic intrusion detection system | Performance |
| 4 | Multi-tenancy based access control model (MTACM) | Security, access control |
| 5 | TLS Handshake | Security |
| 6 | Public key based Homomorphic authenticator with random masking | Privacy, Performance |
| 7 | Third party auditor(TPA) | Efficiency, QoS |
| 8 | Probabilistic sampling technique | Security, Privacy |
| 9 | Diffie-Hellman key exchange | Security, Access control |
| 10 | Private face recognition | Privacy, Performance |
| 11 | Message Authentication Codes (MAC’s) | Efficiency |
| 12 | Data coloring and software water marking techniques | Performance, Security |
| 13 | A Novel Cloud dependability model | QoS, Security |
| 14 | Key Policy Attribute-Based Encryption(KP-ABE) | Privacy, Efficiency |
| 15 | Proxy Re-Encryption (PRE) | Performance, Security |
| 16 | RBAC (Role-Based Access Control) technique | Privacy, Efficiency |
| 17 | Application-oriented Remote Verification Trust Model (ARVTM) | QoS, Security |
| 18 | Security assertion Markup Language (SAML) | Performance, Privacy |
| 19 | Trusted Platform Module (TPM) | QoS, Security |
| 20 | Proof Of Retrievability (POR) | Efficiency, Performance |
| 21 | Fair MPNR protocol | Security, Performance |
| 22 | Sobol Sequence | Security, Performance, Efficiency |
| 23 | Redundant Array of Independent Net-storages (RAIN) | Privacy, Efficiency |
| 24 | Hadoop Distributed File System | performance |
| 25 | Self-Cleansing Intrusion Tolerance (C-SCIT) | Security, Privacy |
| 26 | Searchable symmetric encryption (SSE) | Security, Privacy, Performance |
| 27 | Provable data possession(PDP) | Security, performance, Efficiency |
| 28 | Time bound ticket based mutual authentication scheme | Efficiency, Security, Performance |
| 29 | Security Access Control Service (SACS) | Access control Security |
| 30 | The Service Level Agreement | QoS, Performance |
| 31 | Intrusion detection | Efficiency, Security |
| 32 | Hypervisor | Access Control |
| 33 | Identity Management | Privacy and Security |
References
- Alam T. Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI). 2020 Feb 3;1(2):108-15. [CrossRef]
- Shukur H, Zeebaree S, Zebari R, Zeebaree D, Ahmed O, Salih A. Cloud computing virtualization of resources allocation for distributed systems. Journal of Applied Science and Technology Trends. 2020 Jun 27;1(3):98-105. [CrossRef]
- Voorsluys W, Broberg J, Buyya R. Introduction to cloud computing. Cloud computing: Principles and paradigms. 2011 Feb 28:1-41.
- Prodan R, Ostermann S. A survey and taxonomy of infrastructure as a service and web hosting cloud providers. In2009 10th IEEE/ACM International Conference on Grid Computing 2009 Oct 13 (pp. 17-25). IEEE. [CrossRef]
- Apostu A, Puican F, Ularu G, Suciu G, Todoran G. Study on advantages and disadvantages of Cloud Computing–the advantages of Telemetry Applications in the Cloud. Recent advances in applied computer science and digital services. 2013;2103.
- Gajbhiye A, Shrivastva KM. Cloud computing: Need, enabling technology, architecture, advantages and challenges. In2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence) 2014 Sep 25 (pp. 1-7). IEEE.
- Basu S, Bardhan A, Gupta K, Saha P, Pal M, Bose M, Basu K, Chaudhury S, Sarkar P. Cloud computing security challenges & solutions-A survey. In2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) 2018 Jan 8 (pp. 347-356). IEEE.
- Jangjou M, Sohrabi MK. A comprehensive survey on security challenges in different network layers in cloud computing. Archives of Computational Methods in Engineering. 2022 Oct;29(6):3587-608. [CrossRef]
- Zissis D, Lekkas D. Addressing cloud computing security issues. Future Generation computer systems. 2012 Mar 1;28(3):583-92. [CrossRef]
- Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N. Cloud security threats and solutions: A survey. Wireless Personal Communications. 2023 Jan;128(1):387-413. [CrossRef]
- S.Tavangari. A Novel Approach to Accessing the Scheduled Network. TechRxiv. [CrossRef]
- Sahmim S, Gharsellaoui H. Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia computer science. 2017 Jan 1;112:1516-22. [CrossRef]
- Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M. A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access. 2021 Apr 14;9:57792-807. [CrossRef]
- S.Tavangari. A New Method in the Cryptography. International Journal of Advanced and Management Research, Vol.2, Issue 4, PP.894-900, Aug 2017.


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).