Classification of threats and countermeasures of cloud computing
Rasha Almanasir ;
Deyaa Al-solomon ;
Saif Indrawes ;
Mohammed Almaiah ;
Umar Islam ;
Marwan Alshar'e
Published: 2025/04/08
Abstract
This article focuses on the study of cloud computing, it’s various models, and cloud service types such as SaaS, PaaS, and IaaS. It emphasizes the security challenges and cyber threats associated with cloud environments, while also proposing methods and solutions to protect these systems. The study underlines the advantages of cloud computing in offering rapid, cost-effective access to technology and services, but also points out the vulnerabilities of multi-tenant architectures and the need for robust security measures to address these risks. Additionally, the article presents a detailed analysis of major security threats such as data loss, forgery, man-in-the-middle attacks, and denial of service (DoS) attacks—and explores detection and prevention techniques. These include the use of advanced tools for threat monitoring and pattern analysis, aimed at strengthening security and boosting user trust in cloud computing systems.
Keywords
How to Cite the Article
Almanasir, R., Al-solomon, D., Indrawes, S., Amin Almaiah, M., Islam, U., & Alshar’e, M. (2025). Classification of threats and countermeasures of cloud computing. Journal of Cyber Security and Risk Auditing, 2025(2), 27–42.https://doi.org/10.63180/jcsra.thestap.2025.2.3
Classification of threats and countermeasures of cloud computing is licensed under CC BY 4.0
References
- Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (2023). Cyberattacks and security of cloud computing: a complete guideline. Symmetry, 15(11), 1981.
- Zbořil, M. (2022). Risk Assessment Method of Cloud Environment. Computing and Informatics, 41(5), 1186-1206.
- Shajan, A., & Rangaswamy, S. (2021). Survey of security threats and countermeasures in cloud computing. United International Journal for Research & Technology, 2(7), 201-207.
- Hashim, W., & Hussein, N. A. H. K. (2024). Securing Cloud Computing Environments: An Analysis of Multi-Tenancy Vulnerabilities and Countermeasures. SHIFRA, 2024, 9-17
- Tahirkheli, A. I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., ... & Kim, K. I. (2021). A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges. Electronics, 10(15), 1811.
- Kumar, A., & Kumar, K. A. (2022). A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review. International Journal of Human Computations & Intelligence, 1(3), 13-18
- Abdullayeva, F. (2023). Cyber resilience and cyber security issues of intelligent cloud computing systems. Results in Control and Optimization, 12, 100268.
- Fadhil, I. S. M., Nizar, N. B. M., & Rostam, R. J. (2023). Security and privacy issues in cloud computing. Authorea Preprints.
- Al Nafea, R., & Almaiah, M. A. (2021, July). Cyber security threats in cloud: Literature review. In 2021 international conference on information technology (ICIT) (pp. 779-786). IEEE
- Journal of Computers and Applications, 46(5), 348-361.Rani, P., Singh, S., & Singh, K. (2024). Cloud computing security: a taxonomy, threat detection and mitigation techniques. International Journal of Computers and Applications, 46(5), 348-361.
- Pericherla, S. S. (2023). Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. ISC Int. J. Inf. Secur., 15(1), 1-5.
- Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (2024). Information security risk assessment methods in cloud computing: Comprehensive review. Journal of Computer Information Systems, 1-28.
- Wang, Y., Zhu, M., Yuan, J., Wang, G., & Zhou, H. (2024). The intelligent prediction and assessment of financial information risk in the cloud computing model. arXiv preprint arXiv:2404.09322.
- Yanamala, A. K. Y. (2024). Emerging challenges in cloud computing security: A comprehensive review. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 448-479.
- Devi, T. A., & Jain, A. (2024, May). Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments. In 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT) (pp. 541-546). IEEE.
- Sanagana, D. P. R., & Tummalachervu, C. K. (2024, May). Securing Cloud Computing Environment via Optimal Deep Learningbased Intrusion Detection Systems. In 2024 Second International Conference on Data Science and Information System (ICDSIS) (pp. 1-6). IEEE.
- Aljuaid, W. A. H., & Alshamrani, S. S. (2024). A deep learning approach for intrusion detection systems in cloud computing environments. Applied Sciences, 14(13), 5381.
- Alsadie, D. (2024). Artificial intelligence techniques for securing fog computing environments: trends, challenges, and future directions. IEEE Access.
- Alam, M., Shahid, M., & Mustajab, S. (2024). Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. The Journal of Supercomputing, 80(8), 11491-11555.
- Prakash, S., Malaiyappan, J. N. A., Thirunavukkarasu, K., & Devan, M. (2024). Achieving regulatory compliance in cloud computing through ML. AIJMR-Advanced International Journal of Multidisciplinary Research, 2(2).
- Awan, I. A., Sumra, I. A., Mahmood, K., Akram, M., Mujahid, S. K., & Zaman, M. I. (2024). A Reliable Approach For Data Security Framework In Cloud Computing Network. Migration Letters, 21(S11), 923-934.
- Hassan, O. F., Fatai, F. O., Aderibigbe, O., Akinde, A. O., Onasanya, T., Sanusi, M. A., & Odukoya, O. (2024). Enhancing Cybersecurity through Cloud Computing Solutions in the United States. Intelligent Information Management, 16(4), 176-193.
- Kirti, M., Maurya, A. K., & Yadav, R. S. (2024). Fault‐tolerance approaches for distributed and cloud computing environments: A systematic review, taxonomy and future directions. Concurrency and Computation: Practice and Experience, 36(13), e8081.