Cloud Computing Security Threats and Solutions

Stefan Henry*, Md Liakat Ali**
* UG Scholar, Caldwell University, New Jersey, United States.
** Assistant Professor of Computer Science, United States.
Periodicity:July - December'2017


The continued evolution of technology has led to a vast virtualized network of unlimited possibilities; cloud computing. Cloud computing is an internet based service that offers cloud storage, online storage, to clients. With the use of software applications, providers create an end user virtual application that provides the user with software resources along with the necessary hardware components needed to keep all data secured. Clients are given the choice of three service models when purchasing cloud service; Software as a Service, Platform as a Service, and Infrastructure as a Service. In all cloud servers, there are four different deployment models of cloud systems; the public cloud, private cloud, the hybrid cloud and the community cloud. When it comes to the use of cloud systems, even though there are large amount of advantages there are equally a large amount of serious risks that if left unchecked, could lead to serious implications to the user’s data and the provider’s cloud service. Because of the complexity of cloud computing, developing quality security measures is highly challenging. This paper provides a background on what cloud computing is; it dives into details of the service models, the deployment models, what the threats and risks are. This paper also offers notable solutions to combat the increasing threats against cloud systems.


Cloud Computing, Cloud Storage, Service Models, Cloud Threats, Counter Measures

How to Cite this Article?

Henry, S., Ali, M. L. (2017). Cloud Computing Security Threats and Solutions. i-manager's Journal on Cloud Computing, 4(2), 1-8.



[1]. Ali, M. L., Monaco, J. V., & Tappert, C. C. (2017). Keystroke Biometric studies with Hidden Markov Model and Its Extension on Short Fixed-Text Input. In Ubiquitous Computing, Electronics and Mobile Communication t h Conference (UEMCON), 2017 IEEE 8 Annual International Conference on (pp. 258-264). IEEE
[2]. Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
[3]. Garg, S. (2017). Survey on Cloud Computing and Data Masking Techniques. Accessed December 15, 2017. Retrieved from admin/resources/project/paper/f201704041491311813. pdf
[4]. Iovan, Ş., & Iovan, A. A. (2016). Cloud Computing Security. Fiability & Durability/Fiabilitatesi Durabilitate, (1).
[5]. Krishna, B. H., Kiran, S., Murali, G., & Reddy, R. P. K. (2016). Security Issues In Service Model Of Cloud Computing Environment. Procedia Computer Science, 87, 246-251.
[6]. Mushtaq, M. O., Shahzad, F., Tariq, M. O., Riaz, M., & Majeed, B. (2017). An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS). arXiv preprint arXiv:1702.07140.
[7]. Sabahi, F. (2011, May).Cloud computing security threats and responses. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 245-249). IEEE
[8]. Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
[9]. Thakur, K., Ali, M. L., Kopecky, S., Kamruzzaman, A., & Tao, L. (2016, November). Connectivity, Traffic Flow and Applied Statistics in Cyber Security. In Smart Cloud (SmartCloud), IEEE International Conference on (pp. 295- 300). IEEE
[10] . Thakur, K., Tao, L., Wang, T., & Ali, M. L. (2017). Cloud Computing and its Security Issues. Application and Theory of Computer Technology, 2(1), 1-10.
[11]. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.