Affiliation:
1. University Uttar Pradesh
2. University of Petroleum and Energy Studies (UPES)
Abstract
Abstract
The ascendancy of cloud computing, while praising scalability and flexibility, simultaneously unveils a convoluted security panorama. This review talks about the complicated ideas behind security models in cloud environments. It combines information from several studies to show how cloud security has changed, where it is now, and what the future holds. It details the change from traditional security models to more abstract, data-centric, and user-access control models, showing how people are trying to balance new technologies and cyber threats. Case studies like the Capital One Data Breach add to the discussion by showing how things work in the real world. The discussion then moves on to a summary of the findings that show how important it is to have dynamic, proactive, and multifaceted security approaches. Challenges spanning technical, organisational, and regulatory domains are elucidated, spotlighting gaps and beckoning deeper exploration into emerging technologies' implications and ethical considerations in cloud security. The paper culminates with strategic recommendations for varied stakeholders and signals towards unexplored avenues in cloud security research, particularly intertwining the potential and ethical dimensions of technologies like Quantum Computing and Blockchain. This review seeks to act as a lighthouse, guiding organisations, researchers, and policymakers through the murky waters of cloud security and offering a structured pathway towards a secure, resilient, and ethically sound cloud future.
Publisher
Research Square Platform LLC
Reference39 articles.
1. Thales, "Cloud assets the biggest targets for cyberattacks, as data breaches increase," Thales, 2023.
2. G. V. Research, "Cloud Computing Market Size, Share & Trends Analysis Report By Service (SaaS, IaaS), By Deployment, By Enterprise Size, By End-use, By Region, And Segment Forecasts, 2023–2030," 2018–2021.
3. CISCO, "Cisco Annual Internet Report (2018–2023) White Paper," CISCO, 2020.
4. J. K. D. F. T.. J. B. H. A. and Y. M. M., "PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud," Security and Communication Networks, vol. 2023, p. 17, 2023.
5. "Determinants of Cloud Computing Intentions to Use: Role of Firm’s Size, Managerial Structure and Industrial Sector Firm’s Size, Managerial Structure and Industrial Sector,";Tripathi S;Journal of International Technology and Information Management,2019
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyber Security in the Cloud;Advances in Human and Social Aspects of Technology;2024-01-26