UIJRT » United International Journal for Research & Technology

Survey of Security Threats and Countermeasures in Cloud Computing

Total Views / Downloads: 203 

Cite ➜

Shajan, A. and Rangaswamy, S., 2021. Survey of Security Threats and Countermeasures in Cloud Computing. United International Journal for Research & Technology (UIJRT), 2(7), pp.201-207.


Cloud computing is one of the most trending IT domains in recent times. It allows a user to access state-of-theart resources, technology and infrastructure with just an internet connection. In the past few decades, most global organisations have begun to migrate towards cloud computing environments because of the plethora of advantages that are provided. Cloud computing technology is now growing at a rapid rate and it has become more convenient for organisations to transfer their workload onto the cloud. It calls for less investment and promises delivery of the latest technology at a high velocity. However, security has now become a common concern for the safety of a cloud computing environment. If the cloud environment is not built securely then it can face a lot of cyber threats which take advantage of the vulnerabilities in the system. This puts the assets, resources and the data belonging to a cloud environment at risk. This paper discusses in about the top cyber threats that a cloud computing environment faces. It also covers the countermeasures and the practices that a cloud provider should follow in order to ensure that the cloud environment is robust and impenetrable.

Keywords: Cloud Computing; Cyber attacks; Cyber threats; Deployment; Security.


  1. Mell, P. and Grance, T. (2018). The NIST Definition of Cloud Computing. [online] National Institute of Standards and Technology — NIST. Available at: https://www.nist.gov/ [Accessed 15 Nov. 2018].
  2. CSA, The Egregious 11 – Cloud Computing Top Threats in 2019, Tech. Rep., Cloud Security Alliance, URL https://downloads.cloudsecurityalliance.org/assets/research/topthreats/Egregious11 Cloud-Computing Top-Threats.pdf, 2019
  3. Sharmila, K.” A Review paper on Cloud Computing Models.” international peer reviewed journal (JAC) (2020).
  4. Parthasarathy, Rajamohan, et al.” An Overview of Cloud Computing Different Services Models and Security Issues and Concerns in an Enterprises Data Storages.”,2020
  5. Odun-Ayo, M. Ananya, F. Agono and R. Goddy-Worlu,” Cloud Computing Architecture: A Critical Analysis,” 2018 18th International Conference on Computational Science and Applications (ICCSA), Melbourne, VIC, Australia, 2018, pp. 1-7,
  6. Diaby, Tinankoria, Bashari Rad, Babak. (2017). Cloud Computing: A review of the Concepts and Deployment Models. International Journal of Information Technology and Computer Science. 9. 50-58. 10.5815/ijitcs.2017.06.07.
  7. Muller, Sune, Holm, Stefan, Søndergaard, Jens. (2018). Benefits of ¨ Cloud Computing: Literature Review in a Maturity Model Perspective. Communications of the Association for Information Systems. 37. 10.17705/1CAIS.03742.
  8. Alam, Tanweer. ” Cloud Computing and its role in the Information Technology.” Tanweer Alam. (2020). Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1.2 (2020): 108-115.
  9. Patil, Sulabha & Dharaskar, Raiiv & Thakare, Vilas. (2017). Digital Forensic in Cloud: Critical Analysis of Threats and Security in IaaS, SaaS and PaaS and Role of Cloud Service Providers. 1-7. 10.1109/ICCUBEA.2017.8463984.
  10. Isharufe, F. Jaafar and S. Butakov,” Study of Security Issues in Platform-as-a-Service (PaaS) Cloud Model,” 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2020, pp. 1-6, doi: 10.1109/ICECCE49384.2020.9179414.
  11. Alshammari, S. Alhaidari, A. Alharbi and M. Zohdy,” Security Threats and Challenges in Cloud Computing,” 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, 2017, pp. 46-51, doi: 10.1109/CSCloud.2017.59.
  12. Sun, Panjun. (2019). Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions. IEEE Access. PP. 1-1. 10.1109/ACCESS.2019.2946185.
  13. J. Sun,” Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions,” in IEEE Access, vol. 7, pp. 147420- 147452, 2019, doi: 10.1109/ACCESS.2019.2946185.
  14. Singh, Ashish & Chatterjee, Kakali. (2016). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications. 79. 10.1016/j.jnca.2016.11.027.
  15. Nowrin and F. Khanam,” Importance of Cloud Deployment Model and Security Issues of Software as a Service (SaaS) for Cloud Computing,” 2019 International Conference on Applied Machine Learning (ICAML), Bhubaneswar, India, 2019, pp. 183-186, doi: 10.1109/ICAML48257.2019.00042.
  16. Ramachandra, Gururaj & Iftikhar, Mohsin & Khan, Farrukh. (2017). A Comprehensive Survey on Security in Cloud Computing. Procedia Computer Science. 110. 465-472. 10.1016/j.procs.2017.06.124.
  17. Kumar, Ravi & Raj, Herbert & Perianayagam, Jelciana. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science. 125. 691-697. 10.1016/j.procs.2017.12.089.
  18. Alhenaki, Lubna & Alwatban, Alaa & Alamri, Bashaer & Alarifi, Noof. (2019). A Survey on the Security of Cloud Computing. 1-7. 10.1109/CAIS.2019.8769497.
  19. Basu et al.,” Cloud computing security challenges & solutionsA survey,” 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2018, pp. 347-356, doi: 10.1109/CCWC.2018.8301700.
  20. Cook, Allan & Robinson, Michael & Ferrag, Mohamed Amine & Maglaras, Leandros & He, Ying & Jones, Kevin & Janicke, Helge. (2017). Internet of Cloud: Security and Privacy issues.
  21. Kumar, Rakesh & Goyal, Rinkaj. (2019). On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review. 10.1016/j.cosrev.2019.05.002

For Conference & Paper Publication​

UIJRT Publication - International Journal