JOURNAL ARTICLE

Cloud Computing Security: Challenges, Threats, and Mitigation Techniques

Salve, Yogesh DagaduButala, Swayam PankajTambade, Pranit Prakash

Year: 2025 Journal:   Zenodo (CERN European Organization for Nuclear Research)   Publisher: European Organization for Nuclear Research

Abstract

Cloud computing offers scalable, flexible, and reasonably priced solutions for software distribution, processing, and data storage, cloud computing has completely changed how businesses operate. However, as more and more organisations use cloud technology, it becomes increasingly important to address cloud security issues. This article looks at the primary security issues and risks that companies face when using cloud computing. These include vulnerabilities to denial-of-service (DoS) attacks, insider threats, data privacy and confidentiality, multi-tenancy risks, and authentication issues. Common threats like malware, account theft, data breaches, and man-in-the-middle (MitM) attacks can compromise the availability and integrity of cloud services. The report also outlines mitigating strategies for enhancing cloud security, such as encryption, access control, regular security audits, data backup and recovery, and effective third-party risk management.Emerging trends in cloud security are also discussed, such as the use of zero trust architectures, machine learning (ML) for anomaly analysis, and artificial intelligence (AI) for threat detection, as innovative approaches to handle these evolving threats. The study's conclusion emphasises the necessity of following security regulations and standards, which ensure that companies implement robust security measures to protect confidential data and maintain trust. By understanding and fixing these problems, businesses can increase the security of their cloud infrastructures and lower potential risks.

Keywords:
Cloud computing Cloud computing security Backup Data security Confidentiality Authentication (law) Compromise Data integrity Insider

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.75
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Geochemistry and Geologic Mapping
Physical Sciences →  Computer Science →  Artificial Intelligence
Geological and Geophysical Studies
Physical Sciences →  Earth and Planetary Sciences →  Geology
Geological Modeling and Analysis
Physical Sciences →  Earth and Planetary Sciences →  Geochemistry and Petrology

Related Documents

JOURNAL ARTICLE

Cloud Computing Security: Challenges, Threats, and Mitigation Techniques

Salve, Yogesh DagaduButala, Swayam PankajTambade, Pranit Prakash

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2025
JOURNAL ARTICLE

Security Threats with Associated Mitigation Techniques in Cloud Computing

Mohsin NazirMirza Shuja Rashid

Journal:   International Journal of Applied Information Systems Year: 2013 Vol: 5 (7)Pages: 16-27
JOURNAL ARTICLE

Security threats and mitigation techniques affecting trust computation in cloud computing

Vinod SarafVinod Pachghare

Journal:   Journal of Discrete Mathematical Sciences and Cryptography Year: 2024 Vol: 27 (4)Pages: 1161-1172
© 2026 ScienceGate Book Chapters — All rights reserved.