Vol 24 no.1 2024

Olakunle Isaac IFAWOYE1

Olalere MORUFU2

Esther Tolubori OMONAYIN3

1Information and Communication Technology, Bingham University Karu, Nigeria; 2Department of Cyber Security, National Open University of Nigeria, Head Quarter, Abuja, Nigeria; 3Department of Computer Science, Baze University Abuja, Nigeria;

Abstract

Cloud computing has developed to be an integral aspect of current as well as future information technologies. Technology has been identified as an efficient tool for all the provided services but it is also associated with different threats. Despite many advantages of cloud computing, security remains a main challenge. To successfully migrate through the cloud, one must consider some critical factors, including understanding the main security concerns and putting effective mitigation strategies in place. Since the data that a business or a user stores in the cloud is frequently private and sensitive, numerous fire attacks and data theft have been reported as crucial factors over the years of its development. Cloud-based system contends with a few security risks such as DDoS attacks, man-in-the-middle attacks, phishing scams, and data breaches. Due to the multitenancy architecture, trust is a major challenge and fault tolerance continues to be a problem for the implementation of cloud computing. Data breaches in cloud computing environments may have serious repercussions, including monetary losses, reputational harm, and legal repercussions. Misconfigurations, insider threats, external attacks, malware injections, and phishing scams can all lead to breaches. The way government organizations and intelligence agencies manage data and information has been revolutionized by cloud computing. Organizations are discovering that cloud computing is a smart substitute for traditional hardware and infrastructure because it allows for the replacement of these resources with effective and affordable cloud solutions. Building trust and promoting wider adoption of cloud computing technologies will be greatly aided by emphasizing proactive security measures and ongoing monitoring. This paper presents a review of the security issues with cloud computing and some possible solutions were suggested.

Full Text:

PDF