Work place: Department of Telecommunication & Electronics Engineering, Hajee Mohammad Danesh Science and Technology University, Basherhat, N508, 5200, Dinajpur, Bangladesh
E-mail: sunrizislam@gmail.com
Website:
Research Interests: Artificial Intelligence, Cloud Computing, Cyber Security
Biography
Sunriz Islam: She has completed her B.Sc. in Telecommunication & Electronics Engineering from Hajee Mohammad Danesh Science and Technology University, Basherhat, N508, 5200, Dinajpur, Bangladesh. One of her papers has been published recently. Now she is working on research in Networking, Cloud Computing, Cyber Security, and Artificial intelligence.
By Md. Abul Hayat Sunriz Islam Md. Fokhray Hossain
DOI: https://doi.org/10.5815/ijitcs.2024.04.01, Pub. Date: 8 Aug. 2024
Industry heavyweights like Microsoft, Amazon, and Google are at the forefront of the development and provision of cutting-edge and affordable cloud computing solutions, contributing to the widespread recognition of cloud computing. Without requiring direct human control, this technology provides network services, including data storage and computational power. But security becomes apparent as a major issue, hindering widespread adoption. The present study performs an extensive investigation to investigate security concerns related to cloud computing at several infrastructure levels, including application, network, host, and data. It examines significant issues that could impact the business model for cloud computing and discuss ways to solve security issues at every level that have been documented in the literature. The study identifies open problems, especially when considering cloud capabilities like elasticity, flexibility, and multi-tenancy, which create new problems at every infrastructure tier. Notably, it is found that multi-tenancy has a significant influence, contributing to security issues at all levels including abuse, unavailability, data loss, and privacy violations. The research ends with practical recommendations for additional studies targeted at improving overall cloud computing security. The results highlight the necessity of concentrated effort on mitigating security vulnerabilities resulting from multi-tenancy. This study makes a valuable contribution to the wider discussion on cloud security by identifying particular issues and supporting focused initiatives to strengthen the resilience of cloud infrastructure.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals