A Review in Managing Cloud computing Security Issues and Future Research

  • Wisam Raad
Palabras clave: Cloud, Computing, Security, Issues, Future, Research


Cloud computing is one of the most creative technical developments in the technology breakthrough era. It facilitates all aspects of life from business to social and family life. The rapidly growth of international businesses and the bomb of technological revolution in terms of adopting smart cities and governments, e-commerce and e-learning and etc., gave cloud computing a momentum because to can overcome the barriers of knowledge storage and transform in huge quantity. This made cloud computing topic one of the hot- test in the literature. However, the popularity of cloud computing is not im- mune of risks, especially in security, which leaves a negative effect on the use of cloud computing. But also there is no way to avoid using cloud computing because it is the key driver for smoothening knowledge sharing and storage. Thus, academics and information technology developers are struggling hard to find solution for cloud security issues. In this paper, overview bout cloud computing issues will be discussed and commendations that need to be taken by future research to address those issues will be raised.

Biografía del autor/a

Wisam Raad
Dijlah University College,Iraq; Department of computer science


Al-anzi, F., Yadav, S., & Soni, J. (2014). Cloud Computing: Security Mod- el Comprising Governance, Risk Management and Compliance. 2014 In- ternational Conference on Data Mining and Intelligent Computing (ICD- MIC), 1–6.

Alassafi, M. O., Alharthi, A., Walters, R. J., & Wills, G. B. (2017). A frame- work for critical security factors that influence the decision of cloud adop- tion by Saudi government agencies. Telematics and Informatics, 33,(3). https://doi.org/10.1016/j.tele.2017.04.010

Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011). Collaboration-based cloud computing security management framework. Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011, 364–371. https://doi.org/10.1109/CLOUD.2011.9

Almunawar, M. N. (2015). Benefits and Issues of Cloud Computing for E-Government. Review of Public Administration and Management, 3(1), 1–2.

Aziz, M. A., Abawajy, J., & Chowdhury, M. (2013). The Challenges of Cloud Technology Adoption in E-government. 2013 International Con- ference on Advanced Computer Science Applications and Technologies, 470–474. https://doi.org/10.1109/ACSAT.2013.98

Barclay, C., & Osei-Bryson, K.-M. (2010). Project performance devel- opment framework: An approach for developing performance criteria & measures for information systems (IS) projects. International Journal of Production Economics, 124(1), 272–292. https://doi.org/10.1016/j. ijpe.2009.11.025

Bumpus, W. (2013). NIST Cloud Computing Standards Roadmap. NIST Cloud Computing Standards, 1–3. https://doi.org/10.6028/NIST.SP.500- 291r2

CA Technologies. (2014). Healthcare Security Solutions: Protecting your Organization, Patients, and Information.

Cayirci, E. (2013). Modeling and Simulation as A Cloud Service: A Sur- vey. Proceedings of the 2013 Winter Simulation Conference, 389–400. Choudhary, V. (2007). Software as a Service : Implications for Investment in Software Development The Paul Merage School of Business. Proceed- ings of the 40th Hawaii International Conference on System Sciences, 40(7), 1–10. https://doi.org/10.1109/HICSS.2007.493

Dev, H., Sen, T., Basak, M., & Ali, M. E. (2012). An approach to protect the privacy of cloud data from data mining based attacks. Proceedings - 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, SCC 2012, 1106–1115. https://doi.org/10.1109/SC.Com- panion.2012.133

Devi, T., & Ganesan, R. (2015). Platform-as-a-Service (PaaS): Model and Security Issues. International Journal of Advances in Applied Sciences, 4(1), 13–23. https://doi.org/10.11591/telkomnika.v15i1.8073

Enterprise Risk Management. (2009). Managing Risk in Cloud Comput- ing.

Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud com- puting: A survey. Future Generation Computer Systems, 29(1), 84–106. https://doi.org/10.1016/j.future.2012.05.023

Fu, Z. (2016). Research on the Prediction of the E-commerce Profit Based on the Improved Parallel PSO-LSSVM Algorithm in Cloud Computing Environment. International Journal of Grid and Distributed Computing, 9(6), 369–380.

Gan, Q., & Zheng, J. (2016). A New Algorithm to Improve Efficiency of Resource Scheduling in Clouding Computing Based on Extended Support Vector Machine. International Journal of Grid and Distributed Computing, 9(3), 125–134.

Grindle, M., Kavathekar, J., & Wan, D. (2013). A New era for the Health- care Industry-Cloud Computing Changes the Game. In Accenture.

Hanover, J. (2014). Business Strategy: IDC MaturityScape — Cloud in Healthcare Provider.

Hashem, I. A. T., Yaqoob, I., Badrul Anuar, N., Mokhtar, S., Gani, A., & Ullah Khan, S. (2014). The rise of “Big Data” on cloud computing: Re- view and open research issues. Information Systems, 47, 98–115. https:// doi.org/10.1016/j.is.2014.07.006

Hitachi. (2012). How to Improve Healthcare with Cloud Computing. Irfan, M., Usman, M., Zhuang, Y., & Fong, S. (2015). A Critical Review of Security Threats in Cloud Computing. 2015 3rd International Symposium on Computational and Business Intelligence (ISCBI), 105–111. https://doi. org/10.1109/ISCBI.2015.26

Jakimoski, K. (2016). Security Techniques for Protecting Data in Cloud Computing. International Journal of Grid and Distributed Computing, 9(1), 49–56.

Jassas, M., Qasem, A., & Mahmoud, Q. (2015). A Smart System Connect- ing e-Health Sensors and the Cloud. Proceeding of the IEEE 28th Canadi- an Conference on Electrical and Computer Engineering Halifax, Canada, pp. 712–716. https://doi.org/10.1109/CCECE.2015.7129362

Kaur, K., & Zandu, V. (2016). Secure Data Classification Model in Cloud Computing Using Machine Learning Approach. International Journal of Grid and Distributed Computing, 9(8), 13–22.

Khan, M. A. (2016). A survey of security issues for cloud computing. Jour- nal of Network and Computer Applications, Vol. 71, pp. 11–29. https://doi. org/10.1016/j.jnca.2016.05.010

Khrisna, A., & Harlili. (2014). Risk Management Framework with COBIT 5 and Risk Management Framework for Cloud Computing Integration. 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) Risk, 103–108.

Lele, Q., & Lihua, K. (2016). Technical Framework Design of Safety Pro- duction Information Management Platform for Chemical Industrial Parks Based on Cloud Computing and the Internet of Things. International Jour- nal of Grid and Distributed Computing, 9(6), 299–314.

Li, J., & Cui, C. (2016). Mobile Cloud-based Big Data Library Manage- ment System. International Journal of Grid and Distributed Computing, 9(8), 335–344.

Li, Z. (2016). Design of Cloud Computing Platform for Education Lab- oratory. International Journal of Grid and Distributed Computing, 9(5), 217–228.

Low, C., Chen, Y., & Wu, M. (2011). Understanding the determinants of cloud computing adoption. Industrial Management & Data Systems, 111(7), 1006–1023. https://doi.org/10.1108/02635571111161262

Lu, K. (2016). Study on Data Privacy Monitoring of Cloud Computing and Access Control Strategy. International Journal of Grid and Distributed Computing, 9(7), 237–242.

Mehmi, S., Sangal, A., Verma, H., & Parmar, K. (2016). Economic Viabil- ity of Smart Grid Cloud in India. International Journal of Grid and Distrib- uted Computing, 9(2), 61–72. https://doi.org/10.14257/ijgdc.2016.9.2.07 Naji, H., Wu, C., & Gao, S. (2016). A Semantic-Aware Approach for Au- tomatic Cloud Services Composition. International Journal of Grid and Distributed Computing, 9(8), 181–196.

NSTAC. (2012). NSTAC Report to the President on Cloud Computing. Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the secu- rity risks associated with governmental use of cloud computing. Govern- ment Information Quarterly, 27(3), 245–253. https://doi.org/10.1016/j. giq.2010.01.002

Parode, V., Ghadage, S., & Ghorpade, N. (2014). Cloud Based Data Center in Implementing Wireless. International Journal of Advances In Computer Science and Cloud Computing, 2(2), 136–138.

Phumcharoen, J. (2017). Cloud Computing : The challenges of software business. International Journal of Applied Computer Technology and In- formation Systems, 6(2), 6–10.

Rajaei, H., & Wappelhorst, J. (2011). Clouds & Grids: A Network and Simulation Perspective. Conference: 2011 Spring Simulation Multi-Con- ference, SpringSim ’11, Boston, MA, USA, 143–150.

Rashmi, Sahoo, G., & Mehfuz. (2013). Securing Software as a Service Model of Cloud Computing: Issues and Solutions. International Journal on Cloud Computing: Services and Architecture (IJCCSA), 3(4), 1–11. https://doi.org/10.5121/ijccsa.2013.3401

Sakharkar, V. S., Dande, M., & Mate, S. (2017). Cloud and Big Data : A Compelling Combination. IJESC, 7(3), 4867–4870.

Sarddar, D., Sen, P., & Sanyal, M. K. (2016). Central Controller Frame- work for Mobile Cloud Computing. International Journal of Grid and Dis- tributed Computing, 9(4), 233–240.

Saripalli, P., & Walters, B. (2010). QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security. 2010 IEEE 3rd Interna- tional Conference on Cloud Computing, 280–288. https://doi.org/10.1109/ CLOUD.2010.22

Sengupta, S., Kaulgud, V., & Sharma, V. S. (2011). Cloud Computing Security--Trends and Research Directions. 2011 IEEE World Congress on Services, 524–531. https://doi.org/10.1109/SERVICES.2011.20 Weixiang, X., & Lin, J. (2016). Research on an Approach of Cloud Work- loads Deployment to Public Cloud Based on Open Source Standard. Inter- national Journal of Grid and Distributed Computing, 9(3), 209–220.

Yun, F., & Li, H. (2013). Risk Prediction and Management for the Hybrid Cloud Computing Based on the Bank Model. 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications Risk, 4. https://doi.org/10.1109/ISDEA.2013.532

Cómo citar
Raad, W. (2019). A Review in Managing Cloud computing Security Issues and Future Research. Opción, 35, 771-790. Recuperado a partir de https://produccioncientificaluz.org/index.php/opcion/article/view/32447