Document Type
Journal Article
Publication Title
Symmetry
Volume
15
Issue
11
Publisher
MDPI
School
School of Engineering
RAS ID
62429
Funders
Beijing Natural Science Foundation / King Khalid University
Abstract
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security.
DOI
10.3390/sym15111981
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Comments
Dawood, M., Tu, S., Xiao, H., Alasmary, H., Waqas, M., & Rehman, S. U. (2023). Cyberattacks and security of cloud computing: A complete guideline. Symmetry, 15(11), article 1981. https://doi.org/10.3390/sym15111981