Information Security in the Cloud: A Systematic Review

Authors

DOI:

https://doi.org/10.54943/ricci.v4i1.383

Keywords:

Cloud computing, information security, challenges, practices

Abstract

In a context of increasing adoption of cloud technologies, information security has become a critical issue. This article focuses on identifying, analyzing and addressing information security challenges in cloud environments, while highlighting recommended best practices to ensure data integrity, confidentiality and availability. Using the PRISMA methodology, we seek to answer What are the challenges and best practices of information security in cloud environments? From this base, key challenges are explored, including the secure storage of confidential information and the protection of data privacy. The importance of complying with data protection regulations and laws, such as GDPR (General Data Protection Regulation), is highlighted, especially in a cloud environment operating in different geographic locations. To address these challenges, essential best practices are presented. Encryption is highlighted as a key measure to ensure data confidentiality, while role-based access control is mentioned as a key strategy for managing who has access to information in the cloud. In addition, the need for ongoing risk assessments and a robust incident response plan to effectively protect information in increasingly vulnerable digital environments is emphasized.

Downloads

Download data is not yet available.

References

Abu-Alhaija, M., Turab, N. M., & Hamza, A. R. (2022). Extensive study of cloud computing technologies, threats and solutions prospective. Computer Systems Science and Engineering, 41(1), 225–240. https://doi.org/10.32604/csse.2022.019547

Abdullayeva, F. J. (2023). Cyber resilience and cyber security issues of intelligent cloud computing systems. Results in Control and Optimization, 12, 100268. https://doi.org/10.1016/j.rico.2023.100268

Agapito, G., & Cannataro, M. (2023, June 1). An Overview on the Challenges and Limitations Using Cloud Computing in Healthcare Corporations. Big Data and Cognitive Computing. MDPI. https://doi.org/10.3390/bdcc7020068

Al-Ghuwairi, AR., Sharrab, Y., Al-Fraihat, D. et al. Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. J Cloud Comp 12, 127 (2023).https://doi.org/10.1186/s13677-023-00491-x

Alshayeji, M. H., & Abed, S. (2022). Enhanced video-on-demand security in cloud computing against insider and outsider threats. International Journal of Security and Networks, 17(1), 48–55. https://doi.org/10.1504/IJSN.2022.122550.

Amardeep Kaur, Amandeep Verma (2023). Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing. Journal of Electrical and Computer Engineering, https://doi.org/10.1155/2023/3922393.

Blanco, D. F., Le Mouel, F., Lin, T., & Escudie, M. P. (2023). A Comprehensive Survey on Software as a Service (SaaS) Transformation for the Automotive Systems. IEEE Access, 11, 73688–73753. https://doi.org/10.1109/ACCESS.2023.3294256.

Bhamare, D., Salman, T., Samaka, M., Erbad, A., & Jain, R. (2017). Feasibility of Supervised Machine Learning for Cloud Security. In ICISS 2016 -2016 International Conference on Information Science and Security. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICISSEC.2016.7885853.

Carmen Pérez Rodrigo (2012).“Las revisiones sistemáticas: declaración PRISMA”. Consultado de https://renc.es/imagenes/auxiliar/files/Nutr_1-2012%20Taller%20escritura.pdf.

F. Nadeem, "Evaluating and Ranking Cloud IaaS, PaaS and SaaS Models Based on Functional and Non-Functional Key Performance Indicators,"in IEEE Access, vol. 10, pp. 63245-63257, 2022, doi: 10.1109/ACCESS.2022.3182688.

Goyal, P., & Deora, S. S. (2022). Trust Management Techniques and their Challenges in Cloud Computing: A Review. International Journal of Computer Networks and Applications, 9(6), 761–774. https://doi.org/10.22247/ijcna/2022/217708.

Malkawi, A. R., Bakar, M. S. A., & Dahlin, Z. M. (2023). Cloud computing virtual learning environment: issues and challenges. Indonesian Journal of Electrical Engineering and Computer Science, 30(3), 1707–1712. https://doi.org/10.11591/ijeecs.v30.i3.pp1707-1712.

Mohammed, S., Nanthini, S., Krishna, N. B., Srinivas, I., Rajagopal, M., & Kumar, M. A. (2023). A new lightweight data security system for data security in the cloud computing. Measurement: Sensors, 29, 100856. https://doi.org/10.1016/j.measen.2023.100856.

Mohammed, C. M., & Zeebaree, S. R. (2021). Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. International Journal of Science and Business, 5(2), 17-30.

Mustafa Mohammed, C., & M Zeebaree, S. R. (2021). Sufficient Comparison Among Cloud Computing Services: IaaS, PaaS, and SaaS: A Review. International Journal of Science and Business, 5(2), 17–30.

Prasad, S. N., & Rekha, C. (2023). Block chain based IAS protocol to enhance security and privacy in cloud computing. Measurement: Sensors, 28, 100813. https://doi.org/10.1016/j.measen.2023.100813.

Rodriguez Baca, L. S., Cruzado Puente de la Vega, C. F., Mejía Corredor, C., & Diaz, M. A. A. (2020). Aplicación de ISO 27001 y su influencia en la seguridad de la información de una empresa privada peruana. Propósitos y Representaciones, 8(3).

Sandhu, A. K. (2022). Big Data with Cloud Computing: Discussions and Challenges. Big Data Mining and Analytics, 5(1). https://doi.org/10.26599/BDMA.2021.9020016.

Soveizi, N., Türkmen, F., & Karastoyanova, D. (2023b). Security and privacy concerns in cloud-based scientific and business workflows: A Systematic review. Future Generation Computer Systems, 148, 184-200. https://doi.org/10.1016/j.future.2023.05.015.

Suganya, M., & Sasipraba, T. (2023). Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment. Journal of Cloud Computing, 12(1). https://doi.org/10.1186/s13677-023-00442-6.

Tahirkheli, A. I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., ... Kim, K. I. (2021). A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures and challenges. Electronics (Switzerland), 10(15). https://doi.org/10.3390/electronics10151811.

ThiBac, D., & Minh, N. H. (2022b). Design of network security storage system based on under cloud computing technology. Computers & Electrical Engineering, 103, 108334. https://doi.org/10.1016/j.compeleceng.2022.108334.

Published

2024-01-22

How to Cite

Ortiz, E., Villacorta, C., & Mendoza, A. (2024). Information Security in the Cloud: A Systematic Review. Revista Científica Ciencias Ingenieriles, 4(1), 69–78. https://doi.org/10.54943/ricci.v4i1.383
Metrics
Views/Downloads
  • Abstract
    3580
  • PDF (Español (España))
    1813
  • HTML (Español (España))
    99

Issue

Section

ARTICULOS DE REVISIÓN