A Review on Analyzing Cloud Computing and Network Cyber Security Threats: Issues and Challenges With Solutions

Authors

DOI:

https://doi.org/10.31987/ijict.8.1.288

Keywords:

Cloud Computing, security and safety issues, DDOS attacks, Data Breach, MITM attacks, DNS spoofing,IP spoofing, Rootkit, Botnets, Cyber-security

Abstract

Cloud computing is defined as the practice of storing, managing, and processing data on a network of remote servers hosted on the internet rather than a local server or a personal computer. Cloud computing is among the newest technologies in era of Information Technology (IT). Most firms employ cloud computing to save money on server, storage, and maintenance infrastructure purchases. Addressing the several problems related to cloud computing in depth is therefore rather crucial. A big problem for industries is security. In this paper, we investigate some major advantages of cloud computing and significant features of cloud model. The report also covers security concerns, drawbacks of the current method, and possible solutions related to cloud computing.

Author Biographies

  • Shah Mohammad , Department of Computer Science, Faculty of ICT, Baluchistan University of Information Technology, Engineering and Management Sciences
    1. Department of Computer Science, Faculty of ICT, Baluchistan University of Information Technology, Engineering and Management Sciences, Quetta. Baluchistan, Pakistan.

             bluesky7688@gmail.com

  • Ahthasham Sajid , Department of Cyber Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University
    1. Department of Cyber Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University, Islamabad,

    ahthasham.sajid@riphah.edu.pk

  • Urwa Sajjad Ahmed Abbasi, School of Politics and International Relations, Faculty of Social Science, Quaid-e-Azam University
    1. School of Politics and International Relations, Faculty of Social Science, Quaid-e-Azam University, Islamabad, Pakistan.

    Urwa.sajjad1999@gmail.com

  • Hamza Razzaq , Department of Cyber Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University

        Department of Cyber Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan.
     hamza.razzaq@riphah.edu.pk

  • Shipra Yadav , Department of Computer Science and Engineering, Marwadi University
    1. Department of Computer Science and Engineering, Marwadi University, Rajkot Gujrat India.

    shipra.yadav@marwadieducation.edu.in

  • Shahnaz Khademizadeh , Knowledge & Information Science Shahid Chamran University of Ahvaz
    1. Associate Professor,  Knowledge & Information Science Shahid Chamran University of Ahvaz, Ahvaz, Iran

    sh_khademizadeh@yahoo.com

Downloads

Published

2025-04-29

How to Cite

A Review on Analyzing Cloud Computing and Network Cyber Security Threats: Issues and Challenges With Solutions. (2025). Iraqi Journal of Information and Communication Technology, 8(1), 38-49. https://doi.org/10.31987/ijict.8.1.288

Similar Articles

1-10 of 85

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>