: Data processing, management, and storage have all been changed by the internet of things, which offers companies scalable and reasonably priced solutions. There is serious cybersecurity concerns connected to using cloud services, such as service outages, unauthorized access, and data breaches. Investigating these security threats and developing defenses to enhance cloud security are the goals of this study. This study reviews current security mechanisms including encryption, authentication, and access control and highlights critical vulnerabilities in cloud systems through methodical literature analysis and risk assessment. To assist enterprises in evaluating and prioritizing cloud security concerns, the study suggests a risk assessment methodology. To strengthen cloud computing's overall security posture, best practices and security solutions are also advised. The results of this study will help create cloud infrastructures that are more secure, guaranteeing data availability, confidentiality, and integrity in the rapidly changing digital environment.
Julian Jang‐JaccardSurya NepalYanhui Guo