Cyber Threats and Risk Mitigation Strategies for Cloud Systems and the Internet of Things
الملخص
As reliance on cloud computing and the Internet of Things (IoT) continues to grow, so too do the security risks that threaten the integrity of these systems. These systems are exposed to various threats, including cyberattacks targeting data stored in the cloud and attacks on devices connected within IoT environments. This study explores the emerging cybersecurity risks faced by cloud and IoT systems, focusing on effective strategies to mitigate these risks, such as encryption, multi-factor authentication, and continuous monitoring. The paper also examines the challenges of implementing these strategies, including technological complexities, legal concerns, and high costs. Lastly, the study reviews future trends in cloud computing and IoT security, with a particular emphasis on the increasing role of artificial intelligence and distributed computing to strengthen security and safeguard data.
المراجع
- -Bang A, Bairagi SWI. Cloud computing: History, architecture, security issues. Int J Advent Res Comput Electron. 2015 Mar 28;Special Issue National Conference "CONVERGENCE 2015":103. Available from: https://tinyurl.com/bd2z96cf.
- -Suganya M, Sasi Prabha T. A comprehensive analysis of data breaches and data security challenges in cloud environment. SSRN. 2022 May 18. Available from: https://tinyurl.com/2d6hznpm.
- -Mozumder DP, et al. Cloud computing security breaches and threats analysis. Int J Sci Eng Res. 2017 Jul;8(1):1287. Available from: https://tinyurl.com/4m2pp7ru.
- -Nandgaonkar A, Kulkarni P. Encryption algorithm for cloud computing. Int J Comput Sci Inf Technol. 2016;7(2):983-9. Available from: https://tinyurl.com/yckbjn8s.
- -Kumar R. Exploring data security issues and solutions in cloud computing. Procedia Comput Sci. 2018;125:691–7. Available from: doi:10.1016/j.procs.2017.12.089.
- -Bhardwaj A, et al. Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput Sci Rev. 2021 Feb;100033:1. Available from: doi:10.1016/j.cosrev.2020.100332.
- -Chou TS. Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol. 2013 Jun;5(3):79-80. Available from: doi:10.5121/ijcsit.2013.5306.
- -Duncan B, Whittington M. Cyber security for the cloud and the Internet of Things: How can it be achieved? Eng Technol Ref. 2017 Jun;1:10.1049/etr.2017.0001. Available from: https://doi.org/10.1049/etr.2017.0001.
- -Baccell E. Internet of Things (IoT) societal challenges & scientific research fields for IoT. Inria; November 2021. p. 11. Available from: https://tinyurl.com/bhderjk5.
- -Bodduna R, et al. A review on the different types of Internet of Things (IoT). J Adv Res Dyn Control Syst. 2019 Jan;11(1):154. Available from: https://tinyurl.com/2p88mdr9.
- -De Donno M, et al. Sustainable security for Internet of Things. In: Proceedings of the 2019 International Conference on Smart Applications, Communications and Networking (SmartNets); 2019; p. 1. Available from: doi: 10.1109/SmartNets48225.2019.9069776.
- -McKinley Sconiers-Hasan. Application Programming Interface (API) Vulnerabilities and Risks. Carnegie Mellon University; June 2024. Available from: https://doi:10.1184/R1/25282342.
- -Giese G. Think like a hacker: reducing cyber security risk by improving API design and protection. Cyber Security: A Peer-Reviewed Journal. 2020;4(1):48–57. Available from: https://tinyurl.com/j5anv8yy.
- -Qazi FA. Application Programming Interface (API) Security in Cloud Applications. EAI Endorsed Transactions on Cloud Systems. 2023 Oct 17;7(23):1-2. Available from: https://doi:10.4108/eetcs.v7i23.3011.
- -Dheeneswaran D, Thara L. Cybersecurity threats in the Internet of Things (IoT): A comprehensive analysis. Int Res J Modernization Eng Technol Sci. 2023 Sep 9;1776. Available from: https://tinyurl.com/299nu9cd.
- -Daş R, Gündüz MZ. Analysis of Cyber-Attacks in IoT-based Critical Infrastructures. Int J Inf Secur Sci. 2019 Dec 26;122. Available from: https://tinyurl.com/2k26a2sx.
- -Rana P, Patil BP. Cyber security threats in IoT: A review. J High Speed Networks. 2023;29:109-111. Available from: https://doi:10.3233/JHS-222042.
- -Axon L, et al. Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda. Digit Threats Res Pract. 2022 Dec 5;3(4):34. Available from: https://doi.org/10.1145/3503920.
- -Safhi A, et al. Major Security Threats and Attacks that Facing Cloud Computing with the Main Defence Strategies. Commun Math Appl. 2022;13(1):315-329. Available from: doi:10.26713/cma.v13i1.1973.
- -Olushola OB. Strategies for Securing Cloud Services. IOSR J Comput Eng (IOSR-JCE). 2019 Dec 31;22(1):13. Available from: doi:10.9790/0661-2201031319.
- - Ghassan Sabeeh Mahmood, et al. A secure cloud computing system by using encryption and access control model. J Inf Process Syst. 2019 Jun;15(3):538-49. doi: 10.3745/JIPS.03.0117. Available from: https://doi.org/10.3745/JIPS.03.0117. p. 542.
- - Williamson J, Curran K. The role of multi-factor authentication for modern day security. Semiconductor Sci Inf Devices. 2021 Apr;3(1):16. Available from: doi: https://doi.org/10.30564/ssid.v3i1.3152.
- -Azhagiri M, et al. Intrusion detection and prevention system: Technologies and challenges. Int J Appl Eng Res. 2015;10(87):1. Available from: https://tinyurl.com/mrya8zak.
- -Younus ZS, Alanezi M. A survey on network security monitoring: Tools and functionalities. Mustansiriyah J Pure Appl Sci. 2023;1(2):60. doi: 10.47831/mjpas.v1i2.33. Available from: https://doi.org/10.47831/mjpas.v1i2.33.
- -Ponnusamy S, Gupta P. Scalable data partitioning techniques for distributed data processing in cloud environments: A review. IEEE Access. 2017;1-2. doi: 10.1109/ACCESS.2024.3365810. Available from: https://doi.org/10.1109/ACCESS.2024.3365810.
- -Demolinis R. Impact and mitigation of cyberattacks on IoT devices: A lens on smart home. Master of Science Thesis, University of Turku, Department of Computing; 2023 Aug. p. 83. Available from: https://tinyurl.com/2vmf5avt.
- -Jyotiyana JP, Mishra A. Secure authentication: Eliminating possible backdoors in client-server endorsement. Procedia Comput Sci. 2016;85:607. doi: 10.1016/j.procs.2016.05.227. Available from: https://doi.org/10.1016/j.procs.2016.05.227.
- -Xu X, et al. An adaptive IP hopping approach for moving target defense using a light-weight CNN detector. Security and Communication Networks. 2021;1. doi: 10.1155/2021/8848473. Available from: https://doi.org/10.1155/2021/8848473.
- -Bace R, Mell P. Intrusion detection systems. National Institute of Standards and Technology; 2001. p. 5. Available from: https://tinyurl.com/3mc2c2px.
التنزيلات
المؤلفات المشابهة
- Driss Abbadi, Morocco's cybersecurity strategy between challenges and aspirations , International Journal of Information & Digital Security: مجلد 2 عدد 1 (2024): International Journal of Information & Digital Security
- Nabih Abdelmajid, The Necessity of Cybersecurity for Community Safety The Proposal of the Safe Family Program for Educating the Gulf Arab Community on Information Security for Both Students and Parents , International Journal of Information & Digital Security: مجلد 1 عدد 1 (2023): International Journal of Information & Digital Security
- Driss Abbadi , Digital Gaps and Cyber Risks: Strategies to Ensure Equal Opportunities and Digital Education Security , International Journal of Information & Digital Security: مجلد 3 عدد 2 (2025): International Journal of Information & Digital Security
- Firas Habbal, Impact of Information Security on National Digital Investment , International Journal of Information & Digital Security: مجلد 1 عدد 1 (2023): International Journal of Information & Digital Security
- Wael Badawy, Protocols, Technologies, and Global Deployment Challenges for Quantum Key Distribution , International Journal of Information & Digital Security: مجلد 3 عدد 1 (2025): International Journal of Information & Digital Security
- Sherif Elbatanouny, Georgios Dafoulas, Noha Saleeb, Investigating the impact of technology readiness on citizens’ behavior intention towards potential m-government Solutions , International Journal of Information & Digital Security: مجلد 3 عدد 2 (2025): International Journal of Information & Digital Security
يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.
الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين
- Driss Abbadi, Morocco's cybersecurity strategy between challenges and aspirations , International Journal of Information & Digital Security: مجلد 2 عدد 1 (2024): International Journal of Information & Digital Security
- Driss Abbadi , Digital Gaps and Cyber Risks: Strategies to Ensure Equal Opportunities and Digital Education Security , International Journal of Information & Digital Security: مجلد 3 عدد 2 (2025): International Journal of Information & Digital Security