Information Security in the Cloud: A Systematic Review
DOI:
https://doi.org/10.54943/ricci.v4i1.383Keywords:
Cloud computing, information security, challenges, practicesAbstract
In a context of increasing adoption of cloud technologies, information security has become a critical issue. This article focuses on identifying, analyzing and addressing information security challenges in cloud environments, while highlighting recommended best practices to ensure data integrity, confidentiality and availability. Using the PRISMA methodology, we seek to answer What are the challenges and best practices of information security in cloud environments? From this base, key challenges are explored, including the secure storage of confidential information and the protection of data privacy. The importance of complying with data protection regulations and laws, such as GDPR (General Data Protection Regulation), is highlighted, especially in a cloud environment operating in different geographic locations. To address these challenges, essential best practices are presented. Encryption is highlighted as a key measure to ensure data confidentiality, while role-based access control is mentioned as a key strategy for managing who has access to information in the cloud. In addition, the need for ongoing risk assessments and a robust incident response plan to effectively protect information in increasingly vulnerable digital environments is emphasized.
Downloads
References
Abu-Alhaija, M., Turab, N. M., & Hamza, A. R. (2022). Extensive study of cloud computing technologies, threats and solutions prospective. Computer Systems Science and Engineering, 41(1), 225–240. https://doi.org/10.32604/csse.2022.019547
Abdullayeva, F. J. (2023). Cyber resilience and cyber security issues of intelligent cloud computing systems. Results in Control and Optimization, 12, 100268. https://doi.org/10.1016/j.rico.2023.100268
Agapito, G., & Cannataro, M. (2023, June 1). An Overview on the Challenges and Limitations Using Cloud Computing in Healthcare Corporations. Big Data and Cognitive Computing. MDPI. https://doi.org/10.3390/bdcc7020068
Al-Ghuwairi, AR., Sharrab, Y., Al-Fraihat, D. et al. Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. J Cloud Comp 12, 127 (2023).https://doi.org/10.1186/s13677-023-00491-x
Alshayeji, M. H., & Abed, S. (2022). Enhanced video-on-demand security in cloud computing against insider and outsider threats. International Journal of Security and Networks, 17(1), 48–55. https://doi.org/10.1504/IJSN.2022.122550.
Amardeep Kaur, Amandeep Verma (2023). Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing. Journal of Electrical and Computer Engineering, https://doi.org/10.1155/2023/3922393.
Blanco, D. F., Le Mouel, F., Lin, T., & Escudie, M. P. (2023). A Comprehensive Survey on Software as a Service (SaaS) Transformation for the Automotive Systems. IEEE Access, 11, 73688–73753. https://doi.org/10.1109/ACCESS.2023.3294256.
Bhamare, D., Salman, T., Samaka, M., Erbad, A., & Jain, R. (2017). Feasibility of Supervised Machine Learning for Cloud Security. In ICISS 2016 -2016 International Conference on Information Science and Security. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICISSEC.2016.7885853.
Carmen Pérez Rodrigo (2012).“Las revisiones sistemáticas: declaración PRISMA”. Consultado de https://renc.es/imagenes/auxiliar/files/Nutr_1-2012%20Taller%20escritura.pdf.
F. Nadeem, "Evaluating and Ranking Cloud IaaS, PaaS and SaaS Models Based on Functional and Non-Functional Key Performance Indicators,"in IEEE Access, vol. 10, pp. 63245-63257, 2022, doi: 10.1109/ACCESS.2022.3182688.
Goyal, P., & Deora, S. S. (2022). Trust Management Techniques and their Challenges in Cloud Computing: A Review. International Journal of Computer Networks and Applications, 9(6), 761–774. https://doi.org/10.22247/ijcna/2022/217708.
Malkawi, A. R., Bakar, M. S. A., & Dahlin, Z. M. (2023). Cloud computing virtual learning environment: issues and challenges. Indonesian Journal of Electrical Engineering and Computer Science, 30(3), 1707–1712. https://doi.org/10.11591/ijeecs.v30.i3.pp1707-1712.
Mohammed, S., Nanthini, S., Krishna, N. B., Srinivas, I., Rajagopal, M., & Kumar, M. A. (2023). A new lightweight data security system for data security in the cloud computing. Measurement: Sensors, 29, 100856. https://doi.org/10.1016/j.measen.2023.100856.
Mohammed, C. M., & Zeebaree, S. R. (2021). Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. International Journal of Science and Business, 5(2), 17-30.
Mustafa Mohammed, C., & M Zeebaree, S. R. (2021). Sufficient Comparison Among Cloud Computing Services: IaaS, PaaS, and SaaS: A Review. International Journal of Science and Business, 5(2), 17–30.
Prasad, S. N., & Rekha, C. (2023). Block chain based IAS protocol to enhance security and privacy in cloud computing. Measurement: Sensors, 28, 100813. https://doi.org/10.1016/j.measen.2023.100813.
Rodriguez Baca, L. S., Cruzado Puente de la Vega, C. F., Mejía Corredor, C., & Diaz, M. A. A. (2020). Aplicación de ISO 27001 y su influencia en la seguridad de la información de una empresa privada peruana. Propósitos y Representaciones, 8(3).
Sandhu, A. K. (2022). Big Data with Cloud Computing: Discussions and Challenges. Big Data Mining and Analytics, 5(1). https://doi.org/10.26599/BDMA.2021.9020016.
Soveizi, N., Türkmen, F., & Karastoyanova, D. (2023b). Security and privacy concerns in cloud-based scientific and business workflows: A Systematic review. Future Generation Computer Systems, 148, 184-200. https://doi.org/10.1016/j.future.2023.05.015.
Suganya, M., & Sasipraba, T. (2023). Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment. Journal of Cloud Computing, 12(1). https://doi.org/10.1186/s13677-023-00442-6.
Tahirkheli, A. I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., ... Kim, K. I. (2021). A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures and challenges. Electronics (Switzerland), 10(15). https://doi.org/10.3390/electronics10151811.
ThiBac, D., & Minh, N. H. (2022b). Design of network security storage system based on under cloud computing technology. Computers & Electrical Engineering, 103, 108334. https://doi.org/10.1016/j.compeleceng.2022.108334.
Published
How to Cite
-
Abstract3580
-
PDF (Español (España))1813
-
HTML (Español (España))99
Issue
Section
License
Copyright (c) 2024 Elvis Ortiz, Cristhian Villacorta, Alberto Mendoza

This work is licensed under a Creative Commons Attribution 4.0 International License.









DOI:10.54943/ricci.







