Sureshkumar, V., & Baranidharan, B. (2021, July). A study of the cloud security attacks and threats. In Journal of Physics: Conference Series (Vol. 1964, No. 4, p. 042061). IOP Publishing.
Al-Issa, Y., Ottom, M. A., & Tamrawi, A. (2019). eHealth cloud security challenges: a survey. Journal of healthcare engineering, 2019.
AlMendah, O. M., & Alzahrani, S. M. (2021). Cloud and edge computing security challenges, demands, known threats, and vulnerabilities. Academic Journal of Research and Scientific Publishing, 2(21), 156-175.
Vistro, D. M., Rehman, A. U., Mehmood, S., Idrees, M., & Munawar, A. (2020). A Literature Review on Security Issues in Cloud Computing: Opportunities and Challenges. J. Crit. Rev, 7, 1446-1455.
Talha, M., Sohail, M., & Hajji, H. (2020). Analysis of research on amazon AWS cloud computing seller data security. International Journal of Research in Engineering Innovation, 4(3), 131-136.
Vinoth, S., Vemula, H. L., Haralayya, B., Mamgain, P., Hasan, M. F., & Naved, M. (2022). Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings, 51, 2172-2175.
Chinedu, P. U., Nwankwo, W., Aliu, D., Shaba, S. M., & Momoh, M. O. (2020). Cloud Security Concerns: Assessing the Fears of Service Adoption. Archive of Science & Technology, 1(2), 164-174.
George Amalarethinam, D. I., & Rajakumari, S. (2019). A survey on security challenges in cloud computing.
Jabbar, J., Mehmood, H., & Malik, H. (2020). Security of cloud computing: belongings for the generations. International Journal of Engineering & Technology, 9(2), 454-457.
Altobishi, T., Podruzsik, S., & Gabor, S. Z. (2018, October). A review of the security challenges in the cloud computing. In Proceedings of the 7th International Conference on Research in Science and Technology, Munich (pp. 19-21).
Suthar, F., Khanna, S., & Patel, J. (2019). A Survey on Cloud Security Issues. International Journal of Computer Sciences and Engineering (IJCSE), 7(3), 120-123.
Mandal, S., & Khan, D. A. (2020). A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic.
Yan, L., Hao, X., Cheng, Z., & Zhou, R. (2018, April). Cloud computing security and privacy. In Proceedings of the 2018 international conference on big data and computing (pp. 119-123).
Kumar, Y. K., & Shafi, R. M. (2020). An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem. International Journal of Electrical and Computer Engineering, 10(1), 530.
Khandelwal, M., & Saini, H. (2019, October). Review on Security Challenges of Cloud Computing. In International Conference on Advancements in Computing & Management (ICACM-2019).
Kumar, M. (2020). STUDY ON SECURITY CHALLENGES IN CLOUD COMPUTING. distributed computing, 29(02), 4789-4797.
Kaur, A., & Singh, G. (2020). Cloud Computing Security Issues and Challenges.
Ahmed, A. A., & Hussan, M. T. (2018). Cloud computing: study of security issues and research challenges. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(4), 13-23.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.
Almarabeh, T., & Majdalawi, Y. K. (2019). Cloud Computing of E-commerce. Modern Applied Science, 13(1), 27-35.
Nguyen, N. D. K., & Ali, I. (2021). Implementation of Cloud Customer Relationship Management in Banking Sector: Strategies, Benefits and Challenges. International Journal of Electronics and Communication Engineering, 15(6), 242-247.
El-Attar, N. E., & Awad, W. A. (2019). Integrated Learning Approaches Based on Cloud Computing for Personalizing e-Learning Environment. International Journal of Web-Based Learning and Teaching Technologies, 14(2).
Bello, S. A., Oyedele, L. O., Akinade, O. O., Bilal, M., Delgado, J. M. D., Akanbi, L. A., ... & Owolabi, H. A. (2021). Cloud computing in construction industry: Use cases, benefits and challenges. Automation in Construction, 122, 103441.
- Abstract viewed - 823 times
- Pdf downloaded - 607 times
Affiliations
Khanisha Thanasegaran
School of Computing, UniversitiUtara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Mohamad Fadli Zolkipli
School of Computing, UniversitiUtara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
How to Cite
Comparative Study on Cloud Computing Implementation and Security Challenges
Vol 5 No 3 (2022): December
Submitted: Dec 18, 2022
Published: Dec 21, 2022
Abstract
As a concept, cloud computing can be defined as an innovative paradigm that enables users to access computing resources when they require them, such as network, storage, servers, applications, and services, based on a pay-as-you-go model. Cloud computing refers to the sharing of resources among consumers. As well as providing computing infrastructure, cloud computing also provides users with a platform for developing their own applications on top of this platform. As a result, capital expenditures on the development of applications are reduced because of the software development process. The cloud service allows users to access resources from any location at any time with an internet connection at any time. Although Cloud Computing provides a few advantages, there are some security challenges that must also be overcome. The purpose of this paper is to compare and discuss the implementation of cloud computing in various sectors such as e-health, e-commerce, banking, and the construction industry. This paper also discusses the security challenges of cloud computing in various aspects from various perspectives.
Keywords: cloud computing, cloud service, advantages, implementation, security challenges