Preprint
Article

This version is not peer-reviewed.

Advanced Cloud Security Frameworks: Tackling Evolving Threats and Ensuring Data Integrity

Submitted:

09 January 2025

Posted:

09 January 2025

You are already at the latest version

Abstract
Cloud computing is a public and private data center that provides customers with a single platform across the Internet. Users can upload information and data to the cloud space and query and modify it at will without occupying the memory of their own devices. It is an evolving computing paradigm that stores data and information closer to end users to improve response time and save transmission capacity. Cloud computing has received widespread attention due to its affordability and high-quality services. Despite the many benefits of cloud computing, its security issues are still considered a big challenge. In the cloud computing security landscape, a three-tier model is divided, namely, IaaS, PaaS, and SaaS. The results show that user data tampering and leakage are one of the most discussed topics in the selected literature. Other identified security risks are related to data intrusion and data storage in cloud computing environments. Our research report will discuss in detail the working principles of security-related technologies, as well as the advantages, limitations, and future potential of cloud computing. The results also reveal some recommendations that need to be implemented in future work to ensure data confidentiality, integrity, and availability.
Keywords: 
;  ;  ;  ;  

1.0. Background

Cloud security is that branch of cybersecurity that principally concentrates on protection features concerning cloud data, applications, and services. With all those organizations from different industrial streams leaning mostly towards cloud infrastructures for the storage and running of highly critical applications, the requirement for effective cloud security grows with each passing day. In contrast to traditional IT infrastructure, where data lives on-premises, controlled by an organization, through on-prem-based servers, cloud is built upon remote servers controlled by third-party providers such as Amazon Web Services (AWS), Microsoft Azure and the Google Cloud. Cloud platforms enable organizations to store tremendous amounts of data, run applications at scale, and provide global access to services (What are the benefits of Cloud Computing, 2024). Nonetheless, cloud environments come with their own set of security challenges, which has made the subject of cloud security very relevant for organizations today.
The cloud systems are more scalable, adaptive, and economical as compared to other ways of handling big data, which has led to increased popularity. Moving to cloud has liberated many businesses from the cost and the hassle of running and maintaining physical data centres - employees can focus their skills in areas that matter more to core business (Why is the cloud so cost-effective? 2023; Ananna et al., 2023). Also, cloud computing has provided organizations with rapid responses when needs change quickly with the increased demand for remote work and digital offerings. However, with these benefits come critical security concerns. The very nature of cloud data, accessible via the internet, makes it susceptible to more attacks than that contained in isolated, on-premises systems (Attacks from the Cloud, 2024; Azam, Dulloo, Majeed, Wan, Xin, & Sindiramutty, 2023). It also means that securing data against illegal access, hacks, and cyberattacks on the cloud needs its own security solutions and all new ways of approaching security.
Security issues relating to the cloud mainly focus on securing data. Data housed on a cloud platform can reside across numerous data centers, often strewn throughout different geographical locations and even countries. The implications of this on data sovereignty and regulatory compliance are multifold, since there is very little overlap in the data protection laws across jurisdictions. In sectors where there are multiple compliance guidelines like HIPAA and PCI DSS, just having the proper security tools mitigates the business risk caused by exposed sensitive data (Fandrick, 2024). The organizations will operate within legal and ethical bounds of these laid-down criteria, with non-compliances resulting in hefty penalties and loss of prestige. Some of the critical cloud security solutions that play an essential role in meeting regulatory standards, ensuring data confidentiality and integrity, are security solutions on the cloud with encryption, data masking, and safe ways of data storage methods (Richman, 2023; Azam, Dulloo, Majeed, Wan, Xin, Tajwar, et al., 2023).
Another key pillar of cloud security is access to cloud resources. While cloud platforms have allowed employees, partners, and other stakeholders access to corporate data and applications from almost any location with access to the internet, in return, this has created flexibility and productivity but may open new vectors to possible vulnerabilities (Media, 2023; Azam, Tajwar, Mayhialagan, Davis, Yik, Ali, et al., 2023). For instance, in case an employee works from a remote location, connecting to the cloud via public Wi-Fi in an unencrypted coffee shop, sensitive information becomes open to unauthorized persons. Finally, businesses may utilize contractors and travel remote teams who access from their phones or other personal devices with possibly out of date security layers.
Apart from data protection, access control and threat mitigation, a cloud security solution can help keep your business running. Natural or man-made disasters strike suddenly, and if the organization does not have enough protection against such incidents, its entire data set might be compromised or lost. The cloud security solutions include backup technologies that establish duplicate replicas of data and systems in data centers far from each other, enabling the organizations to bring back their operations swiftly, even during a catastrophic system failure (What is Cloud Backup? How It Works, Benefits and Best Practices, 2024; Azam, Tan, Pin, Syahmi, Qian, Jingyan, et al., 2023). Which is critical to drive customer confidence and sustain business operations in the face of a growing volatile threat landscape.
To summarize, cloud security is the bedrock of modern-day cloud computing. It provides privacy, correctness, availability of data, helps in meeting regulatory requirements, enables remote access safely and secures the entire network infrastructure against a wide variety of cyber-attacks. To organizations leveraging cloud computing as a stepping stone toward accelerated digital transformation, cloud security is both a defense mechanism and a strategic enabler; it empowers them to pursue innovation aggressively without any compromise in risk management processes. This rapid expansion in the adoption of cloud will be complemented by an increased demand for advanced security capabilities that keep pace with evolving threats and, in the end, assure a secure, resilient cloud environment-to their benefit and that of their customers.

3.0. Discussion on the Impact

3.1. Benefits of Cloud Computing Security

Enhanced Data Protection and Compliance

Cloud security frameworks and tools are made to shield private information against breaches, loss, and illegal access. Numerous cloud service providers (CSPs) provide more sophisticated encryption, intrusion detection, and data backup services than the majority of businesses could handle on their own. For instance, organisations can secure data while it’s at rest by encrypting it with a program like BitLocker or FileVault. (Sandesh Achar 2022; Sindiramutty, Tan, Shah, et al., 2024). Cloud security measures are frequently in line with regulatory standards like Compliance General Data Protection Regulation (GDPR) Health Insurance Portability and Accountability Act (HIPAA), and Payment Card Industry Data Security Standard (PCI-DSS), which impose strict data protection requirements on firms managing sensitive data and ensure their clients’ data is protected and that their systems and data are safe from unauthorised access (Sharma et al., 2021). Cloud security lowers the chance of compliance infractions, which can lead to expensive fines and harm to one’s reputation, by following these guidelines.

Scalability of Security Solutions

Due to the tremendous scalability of cloud security solutions, enterprises can more easily modify their security resources in response to demand. Cloud security solutions are dynamically scalable to meet growing workloads as companies grow or experience periods of high usage. For companies that deal with varying activity levels, like e-commerce websites during the holidays, scalability is essential. They may guarantee ongoing protection without needing extra physical infrastructure by utilising cloud security (Singhal et al., 2020). Therefore, businesses may scale resources up or down in response to demand with cloud-based security services, ensuring cost-effectiveness and peak performance. While keeping a strong security posture, this scalability enables organisations to meet the changing demands of their operations. (Vinugayathri Chinnasamy,2024; Sindiramutty, Tan, & Wei, 2024)

Cost-Effectiveness and Efficiency

Many businesses work with CSPs for cloud security and with this, businesses could minimise the expenses associated with maintaining their own security infrastructure (Kinza Yasar, 2024). Cloud computing offers significant cost savings on IT-related expenses, such as reduced implementation and maintenance costs and a reduction in the need to buy and maintain hardware and even eliminates the need for skilled IT personnel. This is because cloud providers usually work on a subscription basis, businesses can only pay for the security services they really utilise. Businesses can increase overall operational efficiency by freeing up resources to concentrate on core competencies by assigning security tasks to CSPs.

Improved Disaster Recovery and Business Continuity

Cloud computing promotes faster and more accurate information and application recovery. It is the most productive recovery plan with least downtime. Cloud security systems also offer data redundancy and backup services, contributing in preventing any losses brought on by unforeseen events. Automatic backup processes typically occur in cloud settings, where data is regularly backed up according to set schedules. To help organisations easily backup and recovery critical data in the case of a disaster at their office locations, these backups might include everything from individual files to complete server instances or databases (Kinza Yasar, 2024). Even in the case of cyberattacks, natural disasters, or other disturbances, data is protected by the reliable disaster recovery and backup solutions that cloud providers offer. Data may be swiftly stored and restored using automated backup solutions, guaranteeing less downtime and promoting business continuity. For example, small and medium-sized businesses (SMEs), who do not have the funds to develop and operate internal disaster recovery systems, can especially benefit from this advantage.

Advanced Threat Detection and Prevention

Cloud security providers often employ the latest security measures and technologies, which improves prevention against cyber attacks. Numerous cloud security companies provide technologies that monitor and identify questionable activity using artificial intelligence and machine learning. Cloud computing security makes it simple to identify attacks through endpoint scanning and global threat intelligence. Additionally, cloud security providers utilise a number of advanced safety features to protect the data and applications of their clients by providing improved protection and constant monitoring (CDNetworks, 2020; Waheed et al., 2024). By automatically reacting to threats, these solutions can help stop breaches before they cause serious harm. AI-driven anomaly detection, for instance, can spot odd login habits or requests for data access, instantly notifying security staff and facilitating a quicker reaction to possible security issues.

3.2. Limitations of Cloud Computing Security

Complex Compliance and Regulatory Challenges

The shared responsibility approach holds companies accountable for specific security measures, even though cloud providers frequently assist with regulatory compliance. This can complicate compliance, particularly for businesses in highly regulated sectors. For instance, failure to adhere to industry standards and regulatory regulations can result in fines, legal repercussions, and harm to one’s image. Examples include improperly managing healthcare data in accordance with HIPAA standards or personally identifiable information (PII) in violation of GDPR (CDNetworks, 2020). Furthermore, data residency regulations need that information be kept within specific territorial bounds, which can be challenging to administer in cloud systems because information may be dispersed across several data centres across the globe.

Increased Risk of Data Breaches

Cloud infrastructures are still vulnerable to data breaches even with the robust security protections provided by CSPs. For example, unauthorized access to sensitive customer data, including financial records, intellectual property, and personal information, that is stored in cloud databases.Data breaches can result from human error or negligence, incorrectly setup services, insufficient access safeguards, targeted malicious attacks, cloud application vulnerabilities, and other security policy flaws in threat intelligence, vulnerability mitigation, and threat detection (Vinugayathri Chinnasamy,2024; Wen et al., 2023). Cloud system vulnerabilities have been brought to light by high-profile data breaches, which has strengthened the need for ongoing monitoring, better access control, and comprehensive security audits.

Dependence on Third-Party Providers

Organisations that depend on cloud providers for security are reliant on the dependability, policies, and incident response capabilities of the provider. The organisation’s data security may be directly impacted by service outages or security flaws on the provider’s end. Therefore, security flaws at these points result in illegal authentication, encryption breaches, and false access controls. These risks are due to weak API credentials, key management errors in the operating system (OS), unpatched software, and hypervisor issues (Abdullah Aljumah, Tariq Ahamed Ahanger, 2020; Alex et al., 2022). In comparison to on-premises security, this reliance restricts an organisation’s ability to manage its own security, which could lead to delayed reactions to attacks or incidents.

Limited Customization of Security Controls

Cloud security solutions are frequently standardised to cater to a wide range of users, businesses with particular security needs may have fewer alternatives for customisation. Smaller providers might not have the freedom to customise solutions to meet demands, even while larger CSPs might offer some customisation. Some cloud security services’ one-size-fits-all approach may not adequately meet the security needs of organisations with operational or compliance constraints. For example, healthcare organizations must follow strict regulations such as HIPAA or Personal Data Protection Act (PDPA) in Malaysia, which demand specific measures such as advanced access controls, encryption, and detailed audit logs. While cloud providers do offer standard security features, they often fall short of meeting these exact needs. For instance, their logging systems might not record everything the law requires, or their encryption tools might not let organizations manage their own keys. This forces healthcare providers to rely on extra tools or complicated customizations to stay compliant.

3.3. Future Potentials of Cloud Computing Security

Advances in Artificial Intelligence and Machine Learning

By automating threat detection, enhancing incident response, and spotting vulnerabilities before they can be exploited, artificial intelligence (AI) and machine learning have the potential to revolutionise cloud security. Large data sets can be analysed by AI-driven security systems to find trends and react to risks instantly. These technologies may eventually make predictive security measures possible, which would take a more proactive approach to cloud security by anticipating and addressing problems before they materialise. In other words, it’s a proactive defence against emerging threats makes it a significant advancement in cloud security as it allows organisations to identify and get rid of dangers before they have a chance to compromise the cloud infrastructure (Kinza Yasar, 2024; Alferidah & Jhanjhi, 2020).

Quantum-Resistant Encryption

Traditional encryption techniques could be at risk from the emergence of quantum computing since these machines can someday crack common cryptographic algorithms. To combat these threats, scientists are creating encryption methods that are immune to quantum technology. Cloud providers are getting ready for the future by implementing quantum-resistant encryption into place to protect data from any risks posed by quantum computing. While Google Cloud and Microsoft Azure are experimenting with more complex algorithms, International Business Machines Corporation (IBM) is already utilising lattice-based cryptography in its services. The goal of these initiatives is to keep systems safe as technology develops by protecting sensitive data, guaranteeing secure data transfer, and safeguarding vital applications like banking, healthcare, and the Internet of Things (IoT). To keep cloud settings safe even as technology develops, cloud providers are probably going to include quantum-resistant algorithms in their security packages.

Expansion of Zero-Trust Architecture

The use of Zero-Trust Architecture (ZTA) to secure cloud environments is growing in popularity. Unauthorised access and lateral movement within a network are reduced by Zero-Trust, which treats each access request as a possible threat. With zero trust, a user’s identity or network location does not automatically provide them access to resources, data, or rights. Instead, regardless of whether an access request comes from inside or outside the network boundary, it is thoroughly authenticated, authorised, and monitored. Cloud providers will probably incorporate more Zero-Trust principles into their offerings as ZTA technology develops, adding an extra degree of security for private information and apps. By implementing zero-trust policies, organisations can reduce the impact of any breaches and the danger of lateral movement attacks. Zero-trust models should become more common in the context of cloud network security as more organisations utilise cloud-based architectures and distributed workforces (Kinza Yasar, 2024; Alkinani et al., 2021).

Increased Use of Blockchain for Data Security

Cloud security may benefit from blockchain technology’s decentralised and impenetrable approach to data management. Blockchain can improve data integrity, auditability, and access control security by logging transactions on a distributed ledger. The integration of blockchain technology with cloud computing has strengthened security across sectors such as banking, healthcare, and IoT. Innovations include frameworks utilizing SHA-256 Cryptographic Hash Algorithm, Elliptic Curve Integrated Encryption Scheme (ECIES) encryption, and blockchain-enabled scheduling to boost data protection, authentication, and resource distribution. Blockchain fosters trust, prevents data tampering, and eliminates the need for third-party intermediaries through smart contracts (Humayun et al., 2020). However, challenges like latency, scalability, and computational overhead persist. Future efforts aim to tackle real-world implementation constraints, address vulnerabilities like DoS/DDoS attacks, and enhance data privacy while improving cost-efficiency and system performance (Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, Muhammad Ayaz, 2021; Babbar et al., 2021). Blockchain may be utilised in the future to provide more transparent and safe records of data access and modifications, giving businesses an unchangeable record of every action made on their data in cloud environments.

4.0. Discussion on Security Countermeasures

4.1. Security Countermeasures

The rapid popularity of cloud computing is also accompanied by increasing complexity in the security landscape. Organisations must deploy rigid security measures so that sensitive data and key infrastructure can be protected. This section will review major security measures that may be employed to reduce the dangers linked to cloud computing. By understanding and implementing these tactics, the organisations will be protecting their assets.

Countermeasures for DDoS Attacks

According to (Kafhali et al., 2021; Figure 2) most prevalent existing countermeasures are DDoS prevention techniques in the Cloud like signature-based, anomaly-based and hybrid methods of detection. These methods classify how traffic should be normal or malicious by monitoring it precisely. Source-end, access point, intermediate network and distributed defences: their deployment strategies allow them to efficiently filter malicious traffic. CIDS or Collaborative Intrusion Detection Systems exchanged information over the region to find regular suspicious activity. Other safeguards include firewalls, rate-limiting, and Intrusion detection (to catch threats in their early stage). This enables the source of an attack to be localised quickly using traceback techniques and IP spoofing detection.

Countermeasures for Data Breaches

To safeguard against data breaches in cloud computing, organizations must prioritize robust access controls. Strong password policies, multi-factor authentication, and role-based access controls can significantly mitigate unauthorised access. Regular security audits and vulnerability assessments are essential to identify and address potential weaknesses (Sushmith, 2024; Fortinet, n.d.).
Encryption is a powerful tool for protecting sensitive data both at rest and in transit. Additionally, implementing a comprehensive data loss prevention (DLP) solution can help prevent accidental or malicious data leaks. Regular security awareness training for employees is crucial to reduce the risk of human error. By educating employees about security best practices, organisations can minimize the likelihood of successful social engineering attacks. Staying up-to-date with the latest security best practices and industry standards, such as those provided by NIST and CISA, is essential for strengthening cloud security posture (Balbix, 2024; America’s Cyber Defense Agency, n.d; Brohi et al., 2020).

4.2. Proposed Countermeasures (Defense Solution)

Proposed Countermeasures Cloud DDos Attack (Defense Solution)

Advanced DDoS defence involves hybrid Intrusion Detection Systems (IDS) combining anomaly-based and signature-based detection for precision and reduced false positives (Kafhali et al., 2021; Figure 3). These work together with SOA-based traceback and cloud filters to identify spoofed IPs reducing the impact of attacks. Distributed defence combines source-end, access point, and intermediate solutions resulting in layered protection. This classification of cloud DDoS defences (shown in the figure) provides a systematic way to mitigate service interruptions through security against advanced threats Chesti et al., 2020. Revised IDS work like Cloud Security Break-in Alarms and the firewalls with traffic inspection and source rate limiting block such traffic i.e. stop bandwidth exhaustion by sending malicious traffic. These measures combine to provide robust protection with little pullback in service (“View of A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review,” n.d.).
Comments:
The countermeasures provide robust protection, combining hybrid IDS, distributed defence, and traceback methods to detect and mitigate attacks effectively. However, constant updates, resource optimization, and seamless integration are essential for maintaining accuracy and minimising false positives, ensuring scalability and efficiency against evolving threats.

Proposed Countermeasures Data Breach Attack

According to (Dalgaard, 2024; Figure 4) to bolster security against data breaches in cloud computing, a comprehensive Security Information and Event Management (SIEM) system is indispensable. SIEM solutions consolidate security logs, enabling real-time threat detection and response. By analysing log data for anomalies, SIEM systems can identify potential breaches early, allowing for swift mitigation.
According to (Gupta, 2023; Figure 5), another vital defence is a Cloud Access Security Broker (CASB). CASBs act as a security layer between users and cloud applications, enforcing policies and monitoring user activity. By controlling access to sensitive data and applications, CASBs prevent unauthorised access and data leakage.

Proposed Countermeasure (IDS)

To enhance cloud security, intrusion detection is a collection of advanced technologies that identifies unwanted actions. Numerous solutions have been created and implemented to protect apps, data, and cloud environments from threats such firewalls and anti-virus, but they still need to be improved. (Chiba et al., 2016) Intrusion Detection Systems (IDS) have changed dramatically over the years, responding to the ever-changing threat scenario. Traditional signature-based IDSs depended on established patterns to recognize known threats. While successful against known threats, some systems struggled to identify unexpected assaults. (Fouda, Ksantini and Elmedany, 2022) Over the various years, multiple approaches have been presented and evaluated using multiple datasets as can be demonstrated from Figure 6, These techniques include, Machine Learning-Based IDS with anomaly detection or behaviour detection and Deep Learning Based IDS with neural network or Natural Language Processing. From the research done by Attou, H, it is obvious that reliable IDS techniques are obtained utilizing ML and DL algorithms (Attou et al., 2023).
Therefore what we proposed is a deep learning-based model by leveraging advanced convolutional neural networks (CNNs)-based model architecture integrated with Recurrent Neural Networks (RNNs) In recent years, deep learning-based detection systems have attracted increased attention due to their capacity to perform better with large-scale and complicated network traffic and their ability to learn representations of features from raw data, making them flexible to diverse assault situations. (Liu and Lang, 2019) A CNN model on its own can effectively manage common issues such as data imbalance and feature redundancy, leading to improved robustness and reliability. Furthermore, By using the Pearson correlation coefficient matrix heatmap, relevant features were selected to reduce computational overhead and time complexity while enhancing the precision of the model. When the model was tested using the CES-CICIDS2018 dataset, it had an accuracy of 98.67% as can be shown in Figure 7. (Aljuaid and Alshamrani, 2024)
When handling sequential data like text or time series, specific architectures are required to comprehend the connections within the sequence. While traditional feed-forward networks struggle with this processing, Recurrent Neural Network (RNN) are suitable for capturing these relationships and can effectively analyze and process sequential data with long-term dependency. (Beltozar-Clemente et al., 2024) RNN has been used multiple times in tests such as in an article by Nasrullah Khan in June 2024 where a hybrid RNN-RF model was used and produced results that were as close to 99.99% accurate (Khan et al., 2024; Dogra et al., 2021). By integrating the strengths of both CNN and RNN, we were confident that it could effectively process sequential data with spatial elements, potentially resulting in improved detection rates and accuracy, particularly for intricate attack vectors that necessitate sequential data evaluation.

5.0. Conclusions

Importance of cloud security for cybersecurity: It can protect data, applications, and services. As organizations adopt cloud infrastructure, the need for effective security grows. Solutions include encryption, data masking, secure storage, and backup technologies to ensure business continuity during disasters. Cloud security provides enhanced data protection, compliance, scalability, cost-effectiveness, improved disaster recovery, and advanced threat detection and prevention. Cloud service providers offer sophisticated encryption, intrusion detection, and data backup services, often in compliance with regulatory standards such as GDPR, HIPAA, and PCI-DSS. This enables enterprises to adjust their security resources to meet growing workloads and maintain operational efficiency. Cloud computing can also facilitate faster and more accurate information and application recovery, reduce downtime, and promote business continuity. Advanced threat detection and prevention technologies such as artificial intelligence and machine learning help prevent cyberattacks and protect customer data and applications.
There are various threats to cloud computing security, such as data breaches, unauthorized access, and cyber threats. Key components include identity and access management (IAM), data encryption, network security, endpoint security, application security, and compliance and monitoring. IAM manages and organizes cloud resource users, while data encryption protects sensitive information. Network security controls data traffic using firewalls, VPNs, intrusion detection systems, and intrusion prevention systems to protect against unauthorized users and network threats. Endpoint security aims to protect devices connected to cloud services, especially in organizations that adopt a BYOD policy. Application security eliminates vulnerabilities and potential vulnerabilities in cloud applications using web application firewalls (WAFs) and automated vulnerability scanning tools. Compliance and monitoring help confirm compliance with regulatory requirements and track potential threats in the environment. Hardware integration of these components provides a comprehensive cloud security strategy that enhances the overall security posture. However, the best defense architecture requires coordination, regular changes, and compatibility testing.
The growing popularity of cloud computing has led to an increase in the complexity of security measures. To protect sensitive data and critical infrastructure, organizations must implement strict security measures.Firewalls, rate limitation, intrusion detection, and signature-based, anomaly-based, and hybrid detection techniques are some of the defenses against DDoS attacks. Strong password policies, role-based access controls, multi-factor authentication, and access controls are necessary to prevent data breaches. To find and fix possible flaws, regular vulnerability assessments and security audits are crucial. Sensitive information is effectively protected by encryption and deliberate, or unintentional data breaches can be avoided by putting in place a complete data loss prevention (DLP) system. Employees must receive regular security awareness training to reduce the possibility of human mistake. Backtracking techniques, distributed defenses, and hybrid intrusion detection systems (IDS) are suggested defenses against cloud DDoS attacks. A thorough security information and event management (SIEM) system and a cloud access security broker (CASB) are essential for data breaches. Intrusion detection technologies, such as machine learning-based and deep learning-based models, can enhance cloud security by identifying unwanted actions and handling complex network traffic.

References

  1. A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. (2021). IEEE Journals & Magazine | IEEE Xplore. https://ieeexplore.ieee.org/abstract/document/9404177. [CrossRef]
  2. Academy, C. (2023). The Data Encryption Standard (DES). Retrieved from Cryptography Academy: https://cryptographyacademy.com/des/.
  3. Achar, S. (2022). Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape. Zenodo (CERN European Organization for Nuclear Research). [CrossRef]
  4. Alex, S. A., Jhanjhi, N., Humayun, M., Ibrahim, A. O., & Abulfaraj, A. W. (2022). Deep LSTM Model for Diabetes Prediction with Class Balancing by SMOTE. Electronics, 11(17), 2737. [CrossRef]
  5. Alferidah, D. K., & Jhanjhi, N. (2020). Cybersecurity Impact over Bigdata and IoT Growth. 2020 International Conference on Computational Intelligence (ICCI). [CrossRef]
  6. Aljuaid, W.H. and Alshamrani, S.S. (2024). A Deep Learning Approach for Intrusion Detection Systems in Cloud Computing Environments. Applied Sciences, [online] 14(13), p.5381. [CrossRef]
  7. Aljumah, A., & Ahanger, T. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET Communications, 14(7), 1185–1191. [CrossRef]
  8. Alkinani, M. H., Almazroi, A. A., Jhanjhi, N., & Khan, N. A. (2021). 5G and IoT Based Reporting and Accident Detection (RAD) System to Deliver First Aid Box Using Unmanned Aerial Vehicle. Sensors, 21(20), 6905. [CrossRef]
  9. America’s Cyber Defense Agency. (n.d.). Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/topics/cybersecurity-best-practices.
  10. Ananna, F. F., Nowreen, R., Jahwari, S. S. R. A., Costa, E. A., Angeline, L., & Sindiramutty, S. R. (2023). Analysing Influential factors in student academic achievement: Prediction modelling and insight. International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence, 2(1). [CrossRef]
  11. Attacks from the Cloud. (25 September, 2024). Retrieved from ISC2: https://www.isc2.org/Insights/2024/09/Cloud-Security-INSIGHTS-Attacks-from-the-Cloud#.
  12. Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A. and Almusallam, N. (2023). Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing. Applied Sciences, [online] 13(17), p.9588. [CrossRef]
  13. Aweda, Z. I. (2024, January 3). What is Cloud Computing? Introduction to the Cloud for Beginners. freeCodeCamp.org. https://www.freecodecamp.org/news/what-is-cloud-computing/.
  14. Azam, H., Dulloo, M. I., Majeed, M. H., Wan, J. P. H., Xin, L. T., & Sindiramutty, S. R. (2023). Cybercrime Unmasked: Investigating cases and digital evidence. International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence, 2(1). [CrossRef]
  15. Azam, H., Dulloo, M. I., Majeed, M. H., Wan, J. P. H., Xin, L. T., Tajwar, M. A., & Sindiramutty, S. R. (2023). Defending the digital Frontier: IDPS and the battle against Cyber threat. International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence, 2(1). [CrossRef]
  16. Azam, H., Tajwar, M. A., Mayhialagan, S., Davis, A. J., Yik, C. J., Ali, D., & Sindiramutty, S. R. (2023). Innovations in Security: A study of cloud Computing and IoT. International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence, 2(1). [CrossRef]
  17. Azam, H., Tan, M., Pin, L. T., Syahmi, M. A., Qian, A. L. W., Jingyan, H., Uddin, M. F., & Sindiramutty, S. R. (2023). Wireless Technology Security and Privacy: A Comprehensive Study. Preprints.org. [CrossRef]
  18. Babbar, H., Rani, S., Masud, M., Verma, S., Anand, D., & Jhanjhi, N. (2021). Load balancing algorithm for migrating switches in software-defined vehicular networks. Computers, Materials & Continua/Computers, Materials & Continua (Print), 67(1), 1301–1316. [CrossRef]
  19. Balbix. (2024, October 21). What is NIST Cybersecurity Framework (CSF) 2.0? https://www.balbix.com/insights/nist-cybersecurity-framework/.
  20. Beltozar-Clemente, S., Iparraguirre-Villanueva, O., Félix Pucuhuayla-Revatta, Zapata-Paulini, J. and Cabanillas-Carbonell, M. (2024). Predicting Customer Abandonment in Recurrent Neural Networks using Short-Term Memory. Journal of open innovation, 10(1), pp.100237–100237. [CrossRef]
  21. Brohi, S. N., Jhanjhi, N., Brohi, N. N., & Brohi, M. N. (2020). Key Applications of State-of-the-Art Technologies to Mitigate and Eliminate COVID-19.pdf. TECHRxiv. [CrossRef]
  22. CDNetworks. (2020, December 23). 7 Biggest Cloud Security Benefits. CDNetworks. https://www.cdnetworks.com/blog/cloud-security/what-is-cloud-security-and-what-are-the-benefits/.
  23. Chesti, I. A., Humayun, M., Sama, N. U., & Jhanjhi, N. (2020). Evolution, Mitigation, and Prevention of Ransomware. 2020 2nd International Conference on Computer and Information Sciences (ICCIS). [CrossRef]
  24. Chiba, Z., Abghour, N., Moussaid, K., omri, A.E. and Rida, M. (2016). A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network. Procedia Computer Science, 83, pp.1200–1206. [CrossRef]
  25. Chinnasamy, V. (2024, March 4). Understanding cloud security – challenges, best practices and benefits. Indusface. https://www.indusface.com/blog/what-is-cloud-security-and-what-are-the-benefits/.
  26. Dalgaard, M. (2024, July 29). What is SIEM? A complete beginners guide to SIEM and Logpoint. Logpoint. https://www.logpoint.com/en/what-is-siem/.
  27. David Puzas (2024, April 01). 12 Cloud Security Issues: Risks, Threats, and Challenges. https://www.crowdstrike.com/en-us/cybersecurity-101/cloud-security/cloud-security-risks/.
  28. Davis, L. (2024, November 20). What is cloud computing? The ultimate guide. Forbes Advisor. https://www.forbes.com/advisor/business/what-is-cloud-computing/.
  29. Dogra, V., Singh, A., Verma, S., Kavita, N., Jhanjhi, N. Z., & Talib, M. N. (2021). Analyzing DistilBERT for Sentiment Classification of Banking Financial News. In Lecture notes in networks and systems (pp. 501–510). [CrossRef]
  30. Fandrick, B. (7 November, 2024). HIPAA vs. PCI DSS requirements for data protection. Retrieved from Liquid Web: https://www.liquidweb.com/blog/hipaa-vs-pci/#:~:text=Data%20protection%20standards%20and%20security%20controls&text=HIPAA%20requires%20covered%20entities%20to,expiration%20dates%2C%20and%20security%20codes.
  31. Fatima-Tuz-Zahra, N., Jhanjhi, N., Brohi, S. N., Malik, N. A., & Humayun, M. (2020). Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning. 2020 2nd International Conference on Computer and Information Sciences (ICCIS). [CrossRef]
  32. Fortinet. (n.d.). What is a Data Breach and How to Prevent It? | Fortinet. https://www.fortinet.com/resources/cyberglossary/data-breach.
  33. Fouda, M., Ksantini, R. and Elmedany, W. (2022). A Novel Intrusion Detection System for Internet of Healthcare Things Based on Deep Subclasses Dispersion Information. IEEE Internet of Things Journal, pp.1–1. [CrossRef]
  34. GeeksforGeeks. (2020, June 24). Advantages and Disadvantages of cloud security. GeeksforGeeks. https://www.geeksforgeeks.org/advantages-and-disadvantages-of-cloud-security/.
  35. Gill, S. H., Sheikh, N. A., Rajpar, S., Jhanjhi, N. Z., Ahmad, M., Razzaq, M. A.,... & Jaafar, F. (2021). Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network. Computers, Materials & Continua, 68(3).
  36. Gopi, R., Sathiyamoorthi, V., Selvakumar, S., Manikandan, R., Chatterjee, P., Jhanjhi, N. Z., & Luhach, A. K. (2021). Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimedia Tools and Applications, 81(19), 26739–26757. [CrossRef]
  37. Gouda, W., Almurafeh, M., Humayun, M., & Jhanjhi, N. Z. (2022). Detection of COVID-19 based on chest x-rays using deep learning. Healthcare, 10(2), 343. [CrossRef]
  38. Gruber, D. & TechTarget, Inc. (2024). Advances in Endpoint Security (By Broadcom). https://docs.broadcom.com/doc/advances-in-endpoint-security.
  39. Gupta, P. (2023, March 26). What is Cloud Access Security Broker (CASB)? - Pradeep Gupta - Medium. Medium. https://medium.com/@pradeepgupta_9558/what-is-cloud-access-security-broker-casb-a6bbbf468dd1.
  40. Hidayat, T., & Mahardiko, R. (2020). A Systematic Literature Review Method on AES Algorithm for Data Sharing Encryption on Cloud Computing. International Journal of Artificial Intelligence Research, 4(1). [CrossRef]
  41. Humayun, M., Sujatha, R., Almuayqil, S. N., & Jhanjhi, N. Z. (2022). A Transfer Learning Approach with a Convolutional Neural Network for the Classification of Lung Carcinoma. Healthcare, 10(6), 1058. [CrossRef]
  42. Humayun, M., Jhanjhi, N. Z., Hamid, B., & Ahmed, G. (2020). Emerging smart logistics and transportation using IoT and blockchain. IEEE Internet of Things Magazine, 3(2), 58-62.
  43. Hussain, K., Rahmatyar, A. R., Riskhan, B., Sheikh, M. a. U., & Sindiramutty, S. R. (2024). Threats and Vulnerabilities of Wireless Networks in the Internet of Things (IoT). 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC), 2, 1–8. [CrossRef]
  44. Jhanjhi, N., Humayun, M., & Almuayqil, S. N. (2021). Cyber security and privacy issues in industrial internet of things. Computer Systems Science and Engineering, 37(3), 361–380. [CrossRef]
  45. Jun, A. Y. M., Jinu, B. A., Seng, L. K., Maharaiq, M. H. F. B. Z., Khongsuwan, W., Junn, B. T. K., Hao, A. a. W., & Sindiramutty, S. R. (2024). Exploring the Impact of Crypto-Ransomware on Critical Industries: Case Studies and Solutions. Preprints.org. [CrossRef]
  46. Kafhali, S.E., Mir, I.E., Hanini, M., 2021. Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing. Archives of Computational Methods in Engineering 29, 223–246. [CrossRef]
  47. Khan, N., Mohmand, M.I., Rehman, S. ur, Ullah, Z., Khan, Z. and Wadii Boulila (2024). Advancements in intrusion detection: A lightweight hybrid RNN-RF model. PLoS ONE, 19(6), pp.e0299666–e0299666. [CrossRef]
  48. Kumar, M. S., Vimal, S., Jhanjhi, N., Dhanabalan, S. S., & Alhumyani, H. A. (2021). Blockchain based peer to peer communication in autonomous drone operation. Energy Reports, 7, 7925–7939. [CrossRef]
  49. Li, J., Goh, W., Jhanjhi, N. Z., Isa, F., & Balakrishnan, S. (2021). An empirical study on challenges faced by the elderly in care centres. EAI Endorsed Transactions on Pervasive Health and Technology, 7(28).
  50. Lim, M., Abdullah, A., Jhanjhi, N., Khan, M. K., & Supramaniam, M. (2019). Link Prediction in Time-Evolving Criminal Network with deep Reinforcement learning technique. IEEE Access, 7, 184797–184807. [CrossRef]
  51. Liu, H. and Lang, B. (2019). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Applied Sciences, [online] 9(20), p.4396. [CrossRef]
  52. Maine Basan. (May 28, 2024). Top Cloud Security Issues: Threats, Risks, Challenges & Solutions. https://www.esecurityplanet.com/cloud/cloud-security-threats/.
  53. Manchuri, A., Kakera, A., Saleh, A., & Raja, S. (2024). pplication of Supervised Machine Learning Models in Biodiesel Production Research - A Short Review. Borneo Journal of Sciences and Technology. [CrossRef]
  54. Media, T. (23 February, 2023). Why the Cloud is Potentially Vulnerable. Retrieved from ThriveDX: https://thrivedx.com/resources/blog/why-the-cloud-is-potentially-vulnerable#:~:text=Lack%20of%20Physical%20Control,-Cloud%20data%20and&text=There%20is%20limited%20control%20over,is%20so%20vulnerable%20to%20cybercriminals.
  55. Mohammed, I.A. (2019) (PDF) Cloud Identity and Access Management - A Model Proposal, CLOUD IDENTITY AND ACCESS MANAGEMENT – A MODEL PROPOSAL. Available at: https://www.researchgate.net/publication/353887567_CLOUD_IDENTITY_AND_ACCESS_MANAGEMENT_-_A_MODEL_PROPOSA.
  56. Muzafar, S. (2021). Energy harvesting models and techniques for green IoT: A review. Role of IoT in Green Energy Systems, 117-143.
  57. Nayyar, A., Gadhavi, L., & Zaman, N. (2021). Machine learning in healthcare: review, opportunities and challenges. In Elsevier eBooks (pp. 23–45). [CrossRef]
  58. Ot, A. (2023, July 11). The Ultimate guide to cloud Computing. Datamation. https://www.datamation.com/cloud/what-is-cloud-computing/.
  59. Pramanik, S., Samantha, D., M, V., & Guha, A. (2022). Cyber security and network security. In Wiley eBooks. [CrossRef]
  60. Ranger, S. (2022, February 25). What is cloud computing? Everything you need to know about the cloud explained. ZDNET. https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to-know-about-the-cloud/.
  61. Ravichandran, N., Tewaraja, T., Rajasegaran, V., Kumar, S. S., Gunasekar, S. K. L., & Sindiramutty, S. R. (2024). Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints.org. [CrossRef]
  62. Richman, A. (9 October, 2023). Data Masking vs Encryption: What You Need to Know. Retrieved from K2View: https://www.k2view.com/blog/data-masking-vs-encryption.
  63. Saleh, M., Jhanjhi, N., & Abdullah, A. (2020, February). Fatima-tuz-Zahra,‘‘Proposing a privacy protection model in case of civilian drone,’’. In Proc. 22nd Int. Conf. Adv. Commun. Technol.(ICACT) (pp. 596-602).
  64. Sama, N. U., Zen, K., Humayun, M., Jhanjhi, N. Z., & Rahman, A. U. (2022). Security in wireless body sensor network: A multivocal literature study. Applied System Innovation, 5(4), 79.
  65. Seng, Y. J., Cen, T. Y., Raslan, M. a. H. B. M., Subramaniam, M. R., Xin, L. Y., Kin, S. J., Long, M. S., & Sindiramutty, S. R. (2024). In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations. Preprints.org. [CrossRef]
  66. SentinelOne (2024, October 25). 17 Security Risks of Cloud Computing in 2024. https://www.sentinelone.com/cybersecurity-101/cloud-security/security-risks-of-cloud-computing/.
  67. Shah, I. A., Jhanjhi, N. Z., & Laraib, A. (2022). Cybersecurity and blockchain usage in contemporary business. In Advances in information security, privacy, and ethics book series (pp. 49–64). [CrossRef]
  68. Sharma, R., Singh, A., Kavita, N., Jhanjhi, N. Z., Masud, M., Jaha, E. S., & Verma, S. (2021). Plant disease diagnosis and image classification using deep learning. Computers, Materials & Continua/Computers, Materials & Continua (Print), 71(2), 2125–2140. [CrossRef]
  69. Sindiramutty, S. R., Jhanjhi, N. Z., Tan, C. E., Khan, N. A., Shah, B., & Manchuri, A. R. (2024). Cybersecurity measures for logistics industry. In Advances in information security, privacy, and ethics book series (pp. 1–58). [CrossRef]
  70. Sindiramutty, S. R., Jhanjhi, N. Z., Tan, C. E., Khan, N. A., Shah, B., Yun, K. J., Ray, S. K., Jazri, H., & Hussain, M. (2024). Future trends and emerging threats in drone cybersecurity. In Advances in information security, privacy, and ethics book series (pp. 148–195). [CrossRef]
  71. Sindiramutty, S. R., Jhanjhi, N. Z., Tan, C. E., Yun, K. J., Manchuri, A. R., Ashraf, H., Murugesan, R. K., Tee, W. J., & Hussain, M. (2024). Data security and privacy concerns in drone operations. In Advances in information security, privacy, and ethics book series (pp. 236–290). [CrossRef]
  72. Sindiramutty, S. R., Jhanjhi, N., Tan, C. E., Lau, S. P., Muniandy, L., Gharib, A. H., Ashraf, H., & Murugesan, R. K. (2024). Industry 4.0. In Advances in logistics, operations, and management science book series (pp. 342–405). [CrossRef]
  73. Sindiramutty, S. R., Tan, C. E., & Wei, G. W. (2024). Eyes in the sky. In Advances in information security, privacy, and ethics book series (pp. 405–451). [CrossRef]
  74. Sindiramutty, S. R., Tan, C. E., Shah, B., Khan, N. A., Gharib, A. H., Manchuri, A. R., Muniandy, L., Ray, S. K., & Jazri, H. (2024). Ethical considerations in drone cybersecurity. In Advances in information security, privacy, and ethics book series (pp. 42–87). [CrossRef]
  75. Singh Solanki, P., Singh, A., Sao, S., & Atkekar, N. D. (2024). Int. J. of Sci. Research in Network Security and Communication (Vol. 12). Prof. (Dr.) Umesh Kumar Singh. [CrossRef]
  76. Singhal, V., Jain, S. S., Anand, D., Singh, A., Verma, S., Kavita, N., Rodrigues, J. J. P. C., Jhanjhi, N. Z., Ghosh, U., Jo, O., & Iwendi, C. (2020). Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned railway level crossings. IEEE Access, 8, 113790–113806. [CrossRef]
  77. Srinivasan, K., Garg, L., Chen, B. Y., Alaboudi, A. A., Jhanjhi, N. Z., Chang, C. T.,... & Deepa, N. (2021). Expert System for Stable Power Generation Prediction in Microbial Fuel Cell. Intelligent Automation & Soft Computing, 30(1).
  78. Sushmith. (2024, October 21). Data breaches in cloud computing | Tips to Prevent. Sprintzeal.com. https://www.sprintzeal.com/blog/data-breaches-in-cloud-computing.
  79. View of A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review [WWW Document], n.d. URL https://www.milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/34/46.
  80. Waheed, A., Seegolam, B., Jowaheer, M. F., Sze, C. L. X., Hua, E. T. F., & Sindiramutty, S. R. (2024). Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure. preprints.org. [CrossRef]
  81. Wayne Jansen, Timothy Grance (2011, Dec), National Institute of Standards and Technology, US. Guidelines on Security and Privacy in Public Cloud Computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf.
  82. Wen, B. O. T., Syahriza, N., Xian, N. C. W., Wei, N. G., Shen, T. Z., Hin, Y. Z., Sindiramutty, S. R., & Nicole, T. Y. F. (2023). Detecting cyber threats with a Graph-Based NIDPS. In Advances in logistics, operations, and management science book series (pp. 36–74). [CrossRef]
  83. What are the benefirs of Cloud Computing. (May28, 2024). Retrieved from prosimo.io: https://prosimo.io/what-are-the-benefits-of-cloud-computing/.
  84. What are the Benefits of Cloud Security? (2021, August 25). Utimaco. https://utimaco.com/service/knowledge-base/cloud-security/what-are-benefits-cloud-security.
  85. What is Cloud Backup? How It Works, Benefits and Best Practices. (5 February, 2024). Retrieved from Spanning: https://www.spanning.com/blog/cloud-backup/.
  86. Why is the cloud so cost-effective? (4 Febuary, 2023). Retrieved from Box Blogs: https://blog.box.com/why-is-the-cloud-so-cost-effective.
  87. Yasar, K., Froehlich, A., & Shea, S. (2024, June 13). cloud security. Search Security. https://www.techtarget.com/searchsecurity/definition/cloud-security.
Figure 1. RSA Algorithm.
Figure 1. RSA Algorithm.
Preprints 145679 g001
Figure 2. DDoS Attack Illustration (Netwrix Blog).
Figure 2. DDoS Attack Illustration (Netwrix Blog).
Preprints 145679 g002
Figure 3. Cloud DDoS Defense Taxonomy (Kafhali et al., 2021).
Figure 3. Cloud DDoS Defense Taxonomy (Kafhali et al., 2021).
Preprints 145679 g003
Figure 4. What is SIEM? A complete beginner guide to SIEM and Logpoint (Dalgaard, 2024).
Figure 4. What is SIEM? A complete beginner guide to SIEM and Logpoint (Dalgaard, 2024).
Preprints 145679 g004
Figure 5. What is Cloud Access Security Broker (CASB)? (Gupta, 2023).
Figure 5. What is Cloud Access Security Broker (CASB)? (Gupta, 2023).
Preprints 145679 g005
Figure 6. A comparison study of several IDSs (Attou et al., 2023).
Figure 6. A comparison study of several IDSs (Attou et al., 2023).
Preprints 145679 g006
Figure 7. Comparison of the latest research on DL for IDSs based on the CES-CICIDS2018 dataset (Aljuaid and Alshamrani, 2024).
Figure 7. Comparison of the latest research on DL for IDSs based on the CES-CICIDS2018 dataset (Aljuaid and Alshamrani, 2024).
Preprints 145679 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated