Overview of Cloud Computing and Security Challenges

Date Received: 07-02-2025

Date Published: 21-02-2025

Section:

TỔNG QUAN

How to Cite:

Luu, V., Huyen, T., & Huyen, N. (2025). Overview of Cloud Computing and Security Challenges. Vietnam Journal of Agricultural Sciences, 22(10). https://doi.org/10.1234/tptt4v77

Overview of Cloud Computing and Security Challenges

Vu Thi Luu (*) , Tran Thi Thu Huyen , Nguyen Thi Huyen

  • Tác giả liên hệ: vtluu@vnua.edu.vn
  • Keywords

    Cloud computing, Network security, IaaS, PaaS, SaaS

    Abstract


    In recent years, cloud computing is growing very strongly in computer science. It plays an important role and position in the process of implementing information technology projects. It has a powerful computing architecture based on the Internet. This technology brings many conveniences to users, but the biggest fear is its safety and security. Security challenges increased with increased cloud usage. That's why many organizations have also implemented projects to provide better security solutions for customers. On the other hand, security experts are also making efforts to research better security solutions. This article presents an overview of the development of cloud computing, its advantages, deployment models and services provided by cloud computing. At the same time, the article summarizes the important challenges in security and privacy in cloud computing, classifies the diverse existing solutions, and compares their strengths and limitations as well as the future research directions.

    References

    Anamika Agarwal, Satya Bhushan Verma, Bineet Kumar Gupta (2023). A Review of Cloud Security Issues and Challenges. Adcaij advances in distributed computing and artificial intelligence journal. 12(1): e31459.

    Arjun Reddy Kunduru (2023). Security Concerns and Solutions for Enterprise Cloud Computing Applications. Asian Journal of Research in Computer Science. 15(4): 24-33.

    Buyya R., Yeo C.S. & Venugopal S. (2008). Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications. pp. 5-13

    Chennam K.K., Muddana L. & Aluvalu R.K. (2017). Performance Analysis of Various Encryption Algorithms for Usage in Multistage Encryption for securing data in Cloud. 2nd IEEE International Conference on Recent trends in Electronics, Information & Communication Technology (RTEICT). pp. 2030-2033.

    Data Remanence. Retrieved from https://en.wikipedia. org/ wiki/Data_remanence on Oct 15, 2023.

    Deepali Bhushan K. (2017). DDoS Attack Defense Framework for Cloud using Fog Computing (2017). 2nd IEEE International Conference on Recent trends in Electronics, Information & Communication Technology (RTEICT). India.

    pp. 534-538.

    Brodkin, J. (2008). Gartener: Seven cloud-computing security risks. Truy cập từ trang gartner-seven-cloud-computing-security-risks.html: https://www.infoworld.com/article/2652198/gartner-seven-cloud-computing-security-risks.html ngày 15/12/2023

    Harfoushi O., Alfawwaz B. & Ghatasheh N.A. (2014). Data Security Issues and Challenges in Cloud

    Computing: A conceptual Analysis and Review. Communications and Network. 6(1): 15-21.

    Hussain Akbar, Muhammad Zubair & Muhammad Shairoze Malik (2023). Security Issues and challenges in Cloud Computing. International Journal for Electronic Crime Investigation. 7(1).

    Iqbal Ahmed (2019). A brief review: security issues in cloud computing and their solutions. Telecommunication Computing Electronics and Control journal. 17(6): 2812, 2817.

    Kumar P. Singh & Arri H. (2013). Data Location in Cloud Computing. International Journal for Science and Emerging Technologies with Latest Trends.

    Manish Kumar Khandelwala & Hukam Chand Sainib (2019). Review on Security Challenges of Cloud Computing. International Conference on Advancements in Computing & Management (ICACM-2019). pp. 1031-1037.

    Merkle Ralph C (1989). A Certified Digital Signature. CRYPTO. New York. pp. 218-238.

    Mell P. & Grance T. (2011). The NIST definition of cloud computing. Special Publication. 800-145.

    Mohammad Ahmar Khan, Dr. Pratibha Gupta, Abdulsatar Abduljabbar Sultan, Dr. Preeti Singh Shivam & Dr. Melanie Lourens (2024). Security in Cloud Computing: Issues and Challenges1Dr. International journal of intelligent systems and applications in engineering. ISSN: 2147-67992

    Muhammad Faheem Mushtaq, Urooj Akram, Irfan Khan, Sundas Naqeeb Khan, Asim Shahzad & Arif Ullah (2017). Cloud Computing Environment and Security Challenges: A Review. International Journal of Advanced Computer Science and Applications. 8(10).

    Nasarul Islam K.V. (2017). Review on Benefits and Security Challenges of Cloud Computing. (IJCSIT) International Journal of Computer Science and Information Technologies. 8(2): 224-228.

    Osama Harfoushi, Bader Alfawwaz, Nazeeh A. Ghatasheh, Ruba Obiedat, Mua’ad M. Abu-Faraj & Hossam Faris (2014). Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. Journal of Communications and Network. 6(1): 15-21.

    Paharia Bhumika & Bhushan K (2018). DDoS Detection and Mitigation in Cloud Via FogFiter: A Defence Mechanism. 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE. pp. 1-7.

    Rosado D.G., Gomez R., Mellado D. & Fernández-Medina E. (2012). Security analysis in the migration to cloud environments. Future Internet. 4(4): 469-487.

    Rao R.V. & Selvamani K. (2015). Data Security Challenges and its Solutions in Cloud Computing. Procedia Computer Science. 48: 204-209.

    Rewagad P. & Pawar Y. (2013). Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing. International Conference on Communication Systems and Network technologies. India. 437-439.

    Sandeep Reddy Gudimetla (2023). Data encryption in cloud storage. International Research Journal of Modernization in Engineering Technology and Science. 6: 2582-5208.

    Somani & Gaurav (2016). DDoS attacks in cloud computing: Collateral damage to non-targets. Computer Networks. 109: 157-171.

    Sony R., Rao S.K.D. & Prasad D.B. (2013). Data Protection and Cloud Computing: A Jurisdictional Aspect. Law Journal of Higher School of Economics. Annual review. pp. 81-91.

    Trần Cao Đệ (2013). Tổng quan về an ninh trên điện toán đám mây. Tạp chí Khoa học Trường Đại học Cần Thơ. tr. 46-53

    Yan Z., Deng R.H. & Varadharajan V. (2017). Cryptography Data Security in Cloud Computing. Information Sciences. 387: 53-55.

    Zhou M., Zhang R., Xie W., Qian W. & Zhou A. (2010). Security and privacy in cloud computing: A survey. Semantics Knowledge and Grid (SKG), 6th International Conference. pp. 105-112.