Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

Profile image of muhammad hasnain

IEEE Access

Related Papers

Innovative Research Publications , Dinesh Taneja

Cloud computing is an evolutionary outgrowth of prior computing approaches which build upon existing and new technologies. Cloud computing is a model for on demand network access to a shared pool of resources such as servers, storage, applications and related services. Cloud computing can be provisioned and released with minimum interaction and preferably without intervention of cloud service provider. The rising awareness and implementations of cloud services and its underlying technologies cause the need for security requirements being up to date. These developments have created new security vulnerabilities, including security issues whose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and countermeasures. The security challenges in cloud computing are formidable, especially for public clouds whose infrastructure and computational resources are owned by an outside party that sells those services to the general public. Cloud security requirements have been addressed in publications earlier, but it is still difficult to estimate what kinds of requirements have been researched most, and which are still under-researched. This paper carries out a systematic literature review by identifying cloud computing security requirements from publications. Along with security issues, upside of information security in cloud computing has also been part of this work.

security issues in cloud computing research paper 2021

International advanced research journal in science, engineering and technology

vishal Thakur Som

International Journal of Scientific & Technology Research

Mubashir Ali

Aarti Patel

https://www.researchgate.net/publication/332159316_Cloud_Computing_Security_Issues_of_Sensitive_Data_An_Analysis

Malka N. Halgamuge

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.

Computational Intelligence and Neuroscience

junaid hassan

Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Thus, the privacy and security of data are of utmost importance to all of its users regardless of the nature of the data being stored. In cloud computing environments, it is especially critical because data is stored in various locations, even around the world, and users do not have any physical access to their sensitive data. Therefore, we need certain data protection techniques to protect the sensitive data that is outsourced over the cloud. In this paper, we conduct a systematic literature review (SLR) to illustrate all the data protection techniques that protect sensitive data outsourced over cloud storage. Therefore, the main objective of this research is to synthesize, classify, and identify important studies in the field of study. Accordingly,...

Gaurav Tyagi

Chief E D I T O R IJRISAT

Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid. It is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider. In this paper, we aim to pinpoint the challenges and issues of cloud computing. Regardless of its advantages, the transition to this computing paradigm raises security concerns, which are the subject of several studies. With the introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities is normally stored in remote servers and locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing that information are compromised. including authentication, encryption and decryption and compression. In this paper, the authors discuss security issues, privacy and control issues, accessibility issues, confidentiality, integrity of data and many more for cloud computing.

Kelvinking Olupitan Omoregie

IJAR Indexing

Security is one of the biggest obstacles that prevent the adoption of cloud computing [1]. Businesses and research are reluctant in shifting the control of digital assets to the third?party service providers [2].Organizations does not enjoy administrative control of cloud services and infrastructure [3]. The security measures taken by the cloud service providers (CSP) are transparent to the organization [4].The presence of large number of users from different organizations aggravates the situation further [2]; the users might be trusted by the CSP but may not trust each other [4]. The above reasons increase the customers? uncertainty about their digital assets on the cloud resulting in reluctance to adopt cloud computing [2].This paper exploits certain information security risks namely data, user identity and access control and contractual and legal issues. Moreover, the manuscript presents a comprehensive solution in literature to cater for all security risks. A critical evaluation of the solution by comparing it with other solutions that exist in literature is provided. The analysis proves the thoroughness and outperformance of the comprehensive solution compared to the other solutions that exist in literature.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Abrar Asghar

Innovative Research Publications

International Journal of Engineering & Technology

Jahangir Jabbar

SN Computer Science

Garima Verma

International Journal of Advances in Computer Science and Technology

WARSE The World Academy of Research in Science and Engineering

Maham Iftikhar

PRIYANKA GUPTA

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

susmita mishra

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

maher muzamal

Computers & Electrical Engineering

Nalini Subramanian

The Surge in Cloud Computing use and its Data Privacy and Security Measures

Oluwafemi Adedeji , Olamide Alashi , Kido Ukwamefune

Journal of Telecommunication, Electronic and Computer Engineering

mohammed ali

Ijca Proceedings on International Conference on Recent Trends in Information Technology and Computer Science 2012

PRASHANT REWAGAD

Ismath Basha

nupur chugh

rashmi priya

Maria A. Omer

… (TSSA), 2012 7th …

Gurudatt Kulkarni

Rahul Neware

Diksha Jain

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

Lecture Notes in Electrical Engineering

Haider Abbas

Vahid Akbari

Mohanaad Shakir , Maytham Hammood

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Help | Advanced Search

Computer Science > Cryptography and Security

Title: data security and privacy in cloud computing: concepts and emerging trends.

Abstract: Millions of users across the world leverages data processing and sharing benefits from cloud environment. Data security and privacy are inevitable requirement of cloud environment. Massive usage and sharing of data among users opens door to security loopholes. This paper envisages a discussion of cloud environment, its utilities, challenges, and emerging research trends confined to secure processing and sharing of data.
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

A review on cloud security issues and solutions

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options.

  • Joraviya N Gohil B Rao U (2024) DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment The Journal of Supercomputing 10.1007/s11227-024-05895-3 80 :9 (12218-12246) Online publication date: 1-Jun-2024 https://dl.acm.org/doi/10.1007/s11227-024-05895-3

Recommendations

Cloud security issues and challenges.

The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. The main features of cloud computing is that the user does not have any setup of expensive computing infrastructure and the cost of its ...

State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment

Cloud computing has taken center stage in the present business scenario due to its pay-as-you-use nature, where users need not bother about buying resources like hardware, software, infrastructure, etc. permanently. As much as the technological benefits,...

Cloud Computing Security: Opportunities and Pitfalls

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other ...

Information

Published in.

Netherlands

Publication History

Author tags.

  • Cloud computing
  • Cloud security
  • virtualization
  • security issues
  • security solutions
  • Research-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 1 Total Citations View Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

The PMC website is updating on October 15, 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • v.14(4); Jul-Aug 2021

Security challenges and solutions using healthcare cloud computing

Mohammad mehrtak.

1. School of Medicine and Allied Medical Sciences, Ardabil University of Medical Sciences, Ardabil, Iran

SeyedAhmad SeyedAlinaghi

2. Iranian Research Center for HIV/AIDS, Iranian Institute for Reduction of High Risk Behaviors, Tehran University of Medical Sciences, Tehran, Iran

Mehrzad MohsseniPour

Tayebeh noori.

3. Department of Health Information Technology, Zabol University of Medical Sciences, Zabol, Iran

Amirali Karimi

4. School of medicine, Tehran University of Medical Sciences, Tehran, Iran

Ahmadreza Shamsabadi

5. Department of Health Information Technology, Esfarayen Faculty of Medical Sciences, Esfarayen, Iran

Mohammad Heydari

6. Department of Health Information Technology, Khalkhal University of Medical Sciences, Khalkhal, Iran

Alireza Barzegary

7. School of medicine, Islamic Azad University, Tehran, Iran

Pegah Mirzapour

Mahdi soleymanzadeh.

8. Farabi Hospital, School of Medicine, Tehran University of Medical Sciences, Tehran, Iran

Farzin Vahedi

Esmaeil mehraeen, omid dadras.

9. Department of Global Health and Socioepidemiology, Graduate School of Medicine, Kyoto University, Kyoto, Japan

Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions. A systematic review was performed using Scopus, Pubmed, Science Direct, and Web of Science databases. Once the title and abstract were evaluated, the quality of studies was assessed in order to choose the most relevant according to exclusion and inclusion criteria. Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud security. Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure. Data encryption could be applied to store and retrieve data from the cloud in order to provide secure communication. Besides, several central challenges, which make the cloud security engineering process problematic, have been considered in this study.

Introduction

Recently, clinical service demand on technology has been increased; cloud computing solutions, telemedicine, artificial intelligence, and electronic health can frequently provide better services [ 1 ]. Cloud computing is the delivery of different services through the Internet. These resources include tools and applications such as data storage, servers, databases, networking, and software [ 2 ]. Rather than owning their computing infrastructure or data centers, companies and organizations can lease access to whatever consists of storage or processing by the cloud service providers [ 3 ]. Shared resources, including servers, networks, storage tools, and application software, use cloud computing significantly [ 4 , 5 ]. Also, cloud computing users can access their programs and information using the Internet as a conduit. The adoption of cloud technology has been increased in all industries, including healthcare [ 6 , 7 ].

Healthcare organizations generate a wide range of data and information. Big data in the field of health need infrastructure for better storage and management. Patient data availability is one of the most vital needs in the health and medical industry [ 8 ]. Also, health researchers need easy access to extensive data for scientific analysis. Cloud technologies are applied in healthcare fields, such as mobile apps, patient portals, electronic medical records, devices with the Internet of Things (IoT), and big data analytics [9–11)] As per the service demands, healthcare providers need considerably to scale the data storage and network requirements.

Furthermore, using the cloud in electronic health records enables patients to easily and widely access their health information. Cloud computing changes how nurses, doctors, hospitals, and clinics deliver quality and profitable services to the patients. The challenges in the healthcare field include operational and infrastructure costs, security concerns to real-time information sharing, and robust backup.

Cloud computing has several advantages, including easy and convenient collaboration between users, reduced costs, increased speed, scalability, and flexibility. The data sharing process is more facilitated by cloud computing. Further, it has the potential to significantly decrease in-house infrastructural and operational costs in healthcare organizations [ 15 ]. By changing traditional data storage and handling procedures, cloud technology can speed up access to information and overcome the barriers that the industry stakeholders and patients encounter. Despite the numerous benefits of cloud computing, there are some drawbacks and challenges. Healthcare organizations are hesitant to adopt cloud computing due to security concerns, including patient information confidentiality, privacy, and service costs [ 16 , 17 ]. Although massive data generated in healthcare organizations should be available to physicians and researchers, confidentiality concerns must be considered [18–20]. New challenges in cloud computing technology emerge in tandem with the growth, epiphany, and use of cloud technology in healthcare organizations; thus, identifying healthcare challenges and security issues appears essential. Accordingly, there are new challenges or security issues concerning offered solutions to cloud computing in healthcare organizations that should be examined and reviewed. Alongside identifying security challenges in cloud technology, reviewing present security solutions and providing new ones are also important objectives of this study. The present study aims at identifying barriers, challenges, security issues, and solutions in implementing cloud computing in the healthcare industry.

Material and Methods

As this systematic review aimed at updating the results of earlier studies [ 21 ] concerning the topic, the eligible articles from the beginning of 2015 to November 2020 were retrieved. A comprehensive search of relevant literature was conducted utilizing the online databases of Scopus, Pubmed, Science Direct, and Web of Science. Two researchers were involved in the online search and identification of the relevant articles. In the first step, based on the inclusion criteria, the relevant studies were included using relevant keywords in the title or abstract. The literature not relevant to the present research and those with no original data were excluded. The second step involved a scrutinized full-text screening of the related article to choose the most eligible.

Research question

This study aims to address the following issues of the modern healthcare systems:

  • • What are the main challenges threatening the security of cloud computing?
  • • What are the solutions to overcome these potential difficulties?

Inclusion/Exclusion criteria

We included the English studies serving our study's purpose from the beginning of 2015 to November 2020.

The exclusion criteria were as follows:

  • • Preliminary data from incompleted projects;
  • • Abstracts, conference abstracts, and any other incomplete projects without full-text manuscripts;
  • • Review articles, letters to the editors, or any types of articles lacking original data.
  • • Articles lacking available free full-text.

A total of 930 full texts of related studies were identified using the selected search strategy. After reviewing them, 360 duplicates were identified and removed; then, two independent investigators screened the title and abstract of the rest (570 resources). The full text of the extracted articles was reviewed, and the most relevant (245 resources) were selected based on the eligibility criteria. According to the selection criteria, 197 articles were excluded, all of which were found to be reviews (n=36), opinion articles (n=28), or not involving cloud security (n=133). Finally, 48 studies met inclusion criteria and were included in the final review ( Figure 1 ).

An external file that holds a picture, illustration, etc.
Object name is JMedLife-14-448-g001.jpg

Flow diagram for the selection process of identified articles.

We identified common security challenges and potential solutions for cloud technology. The reviewed studies and cloud computing security challenges and solutions are presented in Table 1 . According to the review of the studies, the most frequent cloud security challenges were information confidentiality (n=19), data security (n=14), data availability (n=14), data integrity (n=13), and network security (n=12); frequency data are shown in Figure 2 . Furthermore, data encryption (n=17), authentication (n=10), application programming interfaces (API)(n=7), and data classification (n=6) were the most common solutions for the security challenges in cloud infrastructure ( Figure 3 ).

An external file that holds a picture, illustration, etc.
Object name is JMedLife-14-448-g002.jpg

Frequency of the cloud computing security challenges.

An external file that holds a picture, illustration, etc.
Object name is JMedLife-14-448-g003.jpg

Most common identified solutions for security challenges in cloud computing.

Identified security challenges and potential solutions in healthcare cloud computing.

Dashti W [ ]2020PakistanSecurity challenges in cloud computingAvailability, confidentiality, data integrity, control, audit, virtual machine security, network security--
Ogiela L [ ]2020PolandIntelligent data management and security in cloud computingTechniques of secret data management and protectionCryptographic threshold techniques applied to split the secret in a specified group of trustees, being enhanced simultaneously using the shared secret intelligent linguistic threshold schemes
Tariq MI [ ]2020PakistanInformation security controls via Fuzzy AHP for cloud computing and wireless sensor networksThe proportionate security of networksFuzzy Analytical Hierarchy Process (FAHP); Analytical Hierarchy Process (AHP); Fuzzy AHP Methodology.
Tabrizchi H [ ]2020IranSecurity challenges in cloud computingSecurity policies, user-oriented security, application security, data storage, networkData encryption (cryptography, quantum cryptography), secure sockets layer (SSL); Hash functions, message signature, message authentication code; Intrusion detection and prevention systems; firewalls, packet filters; Digital signature, endorsing certificate, notary; public and private blockchains
Wu B [ ]2020ChinaSecurity and secure channelStrategies to assure the confidentiality and security of outsourced sensitive dataChannel-free certificate less searchable public-key authenticated encryption (dCLPAEKS) scheme
Shakil KA[ ]2020IndiaHealthcare management systemIdentity theft, tax fraudulence, medical fraud, bank fraud, insurance fraud, and defamation of high-profile patients; Extending the capabilities of health applications over mobile devices, such as tablets, laptops, and smartphones.Biometric-based authentication mechanism; BAMHealthCloud ensures the security of e-medical data access through a behavioral; Training of the signature samples for authentication purposes has been performed in parallel on the Hadoop MapReduce framework using Resilient Backpropagation neural; ALGO Health Security that performs security checks using parallelized MapReduce programming model.
George Amalarethinam DI [ ]2019IndiaCloud security challenges and solutionsAvailability, confidentiality, privacy, integrityData encryption;
OTP, digital certificate, and biometric verification;
Rain-6 and digital signature.
Giri S [ ]2019NepalCloud security challenges and solutionsData access and confidentialityData encryption and classification
Al-Issa Y [ ]2019JordanSecurity challenges in eHealth cloud computingConfidentiality, integrity, availability, ownership, and privacy of healthcare information; Authenticity, non-repudiation, audit, access control, data remanence and freshness, anonymity, unlinkability cloud multitenancy, secure transmissionHIPAA, HITECH
ISO/IEC 27000-Series
EU General Data Protection Regulation (GDPR)
Patient-Centric Approach, Encryption Techniques
Bazm MM [ ]2019FranceVirtualization layer isolation challengesMemory deduplication;
large-page memory management,
non-privileged access to hardware instructions.
Detection, countermeasure, application-level, OS-level, hypervisor-level, hardware-level, and moving target defense approaches
Modi KJ [ ]2019IndiaCloud security challenges and solutionsSecurity of data is a major factor, which restricts the acceptance of the cloud-based model.Using linear network coding and re-encryption based on ElGamal cryptography in the form of a hybrid approach to secure healthcare information over the cloud;
Linear network coding mechanism.
Kumar PR [ ]2018BruneiCloud security challenges and solutionsConfidentiality, integrity, availability, authentication, authorization, non-repudiationCreating the data, classifying the data, identifying the sensitive data, defining policies, and creating access methods for different data types; Creating policies for archiving and destroying data; Storing data with proper physical and logical security protection, including backup and recovery plan; Identifying which datatype can be shared, with whom and how it can be shared; defining data sharing policies; In cloud computing, many such policies are collectively called as Service Level Agreements (SLA); Creating a corrective action plan in case data is corrupted or hacked due to network or communication devices; security flaws while data is in transit; Data encryption; Using data duplication, redundancy, backups, and resilient systems to address availability issues.
Basu S [ ]2018IndiaSecurity challenges in cloud computingConfidentiality, integrity, availability--
Pinheiro A [ ]2018BrazilSecurity architecture and protocol for trust verifications concerning the integrity of stored files in cloud servicesOrganizing a cloud storage service (CSS) that is safe from the client point of view, implementing CSS in public clouds, integrity, availability, privacy, and trust for the adopting cloud storage service
Subramanian N [ ]2018IndiaSecurity challenges in cloud computingCloud computing threats and risks, security in crypto-cloudInfrastructure-as-a-Service, Platform-as-a-Service, Software-as-a-Service, Testing-as-a-Service, Security-as-a-Service, Database-as-a-Service
Stergiou C [ ]2018GreeceSecurity, privacy, and efficiency of sustainable cloud computing for big data and IoTThe security and privacyInstalling a security "wall" between the cloud server and the Internet
Abrar H [ ]2018PakistanRisk analysis of cloud sourcing in healthcare and public health industryData breaches, data loss, account hijacking, insecure interfaces and APIs, denial-of-service attacks (dos), malicious insiders, abuse of cloud resources, insufficient due diligence, shared technology issuesLikelihood determination, impact analysis, risk determination
Esposito C [ ]2018ItalyCloud security challenges and solutionsConfidentiality, privacyData encryption, blockchain
Huang Q [ ]2018ChinaData security challenges and solutionsConfidentiality, availabilityData encryption, public-key encryption, identity-based encryption, identity-based broadcast encryption, attribute-based encryption
Roy S [ ]2018IndiaCloud security challenges and solutionsThe authentication process and securityA combined approach of fine-grained access control over cloud-based multi-server data along with a provably secure mobile user authentication mechanism for the Healthcare Industry 4.0.
Al-Shqeerat KH [ ]2017Saudi ArabiaSecurity challenges in cloud computingNetwork security, access control, cloud infrastructure, data securityEducating the stakeholders adequately on the cloud; Making sure that the IT administrator is able to control and manage cloud items and services when concluding the contract agreement with the service provider; An agreement with a third party to perform audits regularly to monitor the performance and compliance of the service provider to the agreed terms; Monitoring the performance of available cloud services and resources periodically; Data and applications in the cloud environment must be classified based on their values (according to their importance and sensitivity); not all data stored in the cloud are rated as top secure data; Backup and recovery; Proper authentication, authorization, and access security tools and mechanisms; Providing suite strong encryption protocols and key management for data at rest, in transit, and on the backup state
Barona R [ ]2017IndiaSecurity challenges in cloud computingData breach, account or service traffic hijacking, insecure interfaces and Application Programming Interfaces (APIs), denial-of-Service (DOS), malicious insiders, abuse of cloud services, shared technology vulnerabilitiesInformation-centric security,high-assurance remote server attestation privacy-enhanced business intelligence, privacy and data protection, homomorphic encryption Searchable/ structured encryption, proofs of storage, server aided secure computation
Bhushan K [ ]2017IndiaSecurity challenges in cloud computingPhysical level security issues, application and software-related security issues, network-related security issues, data-related security issues, computation-related issues, hardware virtualization-related issues, management and account control-related issues, trust-related issues, compliance and law-related issuesClassification based on the type technique used, classification based on the attack detection principle, classification based on reaction time, classification based on deployment point, classification based on the degree of deployment, classification based on the degree of cooperation, classification based on the defense activity, classification based on response strategy
Park J [ ]2017KoreaBlockchain security in cloud computingadapting blockchain security computing and its secure solutionsBlockchain provides security through the authentication of peers that share virtual cash, encryption, and generation of the hash value
Radwan T [ ]2017EgyptCloud computing securityPrivileged access, Data location; Availability, Investigation support; Regulatory compliance, Data segregation; Recovery, Long-term viability.Authentication, authorization
Singh A [ ]2017IndiaCloud security issuesZombie attack (DoS/DDoS attack); Service injection attack; Attack on virtualization/hypervisor; User to root attacks; Port scanning; Man-in-middle attack; Metadata spoofing attack; Phishing attack; Backdoor channel attack.Strong authentication and authorization; Strong isolation mechanisms between VMs; Using the hash function to check service integrity; web service security; Adopting secure web browsers and API; Using a strong password; better authentication mechanism; Requiring strong port security, Requiring a proper Secure Socket Layer (SSL) architecture; Service functionality and other details should be kept in encrypted form to access the file required a strong authentication mechanism; Using a secure web link (HTTPS); Requiring strong authentication, authentication, and isolation mechanisms.
Mohit P [ ]2017IndiaCloud security challenges and solutionsSecurity protection is important for medical records (data) of the patients because of very sensitive information. Patient anonymity.Authentication protocol for TMIS using the concept of cloud environment
Hussein NH [ ]2016SudanCloud security challenges and solutionsAuthentication and authorization; Data confidentiality; Availability; Information security; Data access; Data breaches.Logical network segmentation; Firewalls implementing; Traffic encryption; Network monitoring;
Kaur M [ ]2016IndiaCloud security challenges and solutionsConfidentiality; Authentication; Integrity; Non-repudiation; AvailabilityData classification; Data Encryption
Muthurajan V [ ]2016IndiaAn elliptic curve-based Schnorrcloud security model in a distributed environmentThe security upgrade in data transmission ApproachesA virtual machine-based cloud model with Hybrid Cloud Security Algorithm (HCSA); The combination of Elliptic Curve-based Schnorr (EC-Schnorr) scheme and blooming filter; A virtual machine-based cloud model with Hybrid Cloud Security Algorithm (HCSA); The optimization in the computational steps by ECC signature set and the duplication removal by blooming filter in the proposed Hybrid Cloud Security Algorithm (HCSA)
Prakash C [ ]2016IndiaCloud computing securityDeployment model issue, service model issues, network issuesCategorization of the data according to the risk associated with the data; Service Level Agreement (SLA); isolation amongst the resources by using segmentation; development of the dedicated application; a strong two-factor authentication
Vurukonda N [ ]2016IndiaPrivacy and confidentiality in the cloud environmentData privacy and integrity, improper media sanitization, data recovery and vulnerability, data backup, service level agreements malicious insider, outside intruder, legal issues, confidentialitySecCloud, for securing cloud data; FADE, a protocol for data privacy and integrity; TimePRE, a scheme for secure data sharing in the cloud; a methodology for security of resident data SPICE, identity management framework;role-based access control scheme, identity management framework
Alasmari S [ ]2016USASecurity and privacy, challenges in IoT-based health cloudManaging credentials and controlling access to applications and patient's confidential information, implementing and deploying cryptographic protocols in IoT health cloud correctly, mitigating device vulnerabilities and deploying firmware patches, securing IoT health networks and minimizing the risk of data loss
Albuquerque SL [ ]2016BrazilSecurity in cloud-computing-based mobile healthPersonal equipment vulnerabilities, assurance of cloud computing service availability assurance of confidentiality and integrity in unreliable cloud environments, access control and authenticity guarantee of systems users
Casola V [ ]2016ItalyHealthcare-related data in the cloud: challenges and opportunitiesHaving a decentralized and distributed design, allowing asynchronous interactions, supporting security mechanisms concerning privacy regulations, providing flexible data and service integrationCryptographic solutions, such as privacy-preserving cloud ones
EL Bouchti A [ ]2016MoroccoCloud security challenges and solutionsConfidentiality, availability, data portabilityData encryption
Dorairaj SD [ ]2015IndiaCloud security challenges and solutionsConfidentiality, auditabilityAccess control, data encryption, integrity verification, log analysis, data classification
Kene SG [ ]2015IndiaCloud security challenges and solutionsConfidentiality, integrity availabilityHybrid detection technique, network intrusion detection system (NIDS)
Liu Y [ ]2015USACloud security challenges and solutionsLoss of control, lack of transparency, multi-tenancyData encryption, access control
Ali M [ ]2015USASecurity challenges in cloud computingCommunication, architectural contractual and legal mobile application security, authentication, user privacy, data securityUsing virtual LANs, IPS, IDS, and firewalls as a combination to protect the data in transit; Using off-the-shelf technology; Using standard algorithms; The implementers should secure each virtualized OS in each guest VM; The VMs at rest should be encrypted; Third-party security technology should be applied to decrease dependency on the CSP; VM images at rest should be patched with the latest fixes as soon as required; Security's vulnerability assessment tools should cover the virtualized environment; Virtualization-aware security tools should be implemented and used in the cloud computing environment; The protection mechanism should be in place until VMs are patched. The risk and attack models should be continuously built and maintained; Regular penetration testing for web applications should be carried out; The secure software lifecycle and software architecture should be developed and maintained; The source of the attributes should be as close to the master one as possible; Open standard federations, such as SAML and OAuth, should be preferred if possible; Bi-directional trust should be ensured for secure relationship and transactions.
Anand P [ ]2015USASecurity challenges in cloud computingTraffic hijacking, data breaches, data loss, insecure APIs, denial-of-Service, abuse of cloud services, malicious insiders, shared technology issues--
Rao RV [ ]2015IndiaData security challenges in cloud computingIntegrity, confidentiality breaches, segregation, storage, data center operationEncryption, RSA signature,identity-based cryptography, data security RSA-based storage security technique, distributed access control architecture
Wang B [ ]2015USADDoS attack protectionNetwork securityThe SDN-based network management, DaMask
Wang Y [ ]2015JapanFog computing: security and forensicsTrust issue due to dependency on CSP, preserving the integrity, decentralization of logs, absence of critical information in logs, logs in multiple tiers and layers, volatility of logs, dependency on CSP for logs, dependability on CSP for data acquisition, trust issues of cloud computing, multi-tenancy, the chain of custodyAPI provided by CSP for logs, the cloud management plan, robust SLA, global unity, virtual machine introspection, the trusted third party, continuous synchronization, TPM, data provenance in the cloud, isolating a cloud instance
Moosavi SR [ ]2015FinlandCloud security challenges and solutionsEnd-to-end security for healthcare IoTSession resumption-based end-to-end security scheme for healthcare Internet of things (IoT), The projected scheme is realized by using a certificate-based DTLS handshake between end-users and smart gateways, besides applying the DTLS session resumption method.
Zhang K [ ]2015USACloud security challenges and solutionsSecurity and privacyPrivacy-preserving health data aggregation, secure health data access and processing, misbehavior detection for the health-oriented mobile social network application
Zhou J [ ]2015ChinaCloud security challenges and solutionsE-healthcare cloud computing systemsTraceable and revocable multi-authority attribute-based encryption named TR-MABE to achieve efficiently multi-level privacy preservation without introducing other special signatures, secret keys used to protect patient's identity and PHI
Khattak HAK [ ]2015PakistanSecurity concerns of cloud-based healthcare systemsConfidentiality, integrity, availability, privacyAccess control, multi-cloud computing security

Although cloud computing, as a novel technology, provides patient data availability all across, it encounters critical challenges in meeting one of the health industry's most significant demands. In cloud computing, providing security systems is necessary due to its inherent features, such as remote data storage, lack of network environment, proliferation, and massive infrastructure sharing [ 69 ]. Therefore, accurate identification of security challenges and their appropriate solutions is essential for both cloud computing providers and organizations using this technology [ 62 ].

Recently, artificial intelligence (AI) has shown a promising bright future in medical issues, especially when combined with cloud computing. Ahmed Sedik et al. have used AI deep learning to create a tool for quick screening of COVID-19 patients from their chest X-rays. This modality can be performed through a cloud-based system anywhere radiography equipment is found [ 70 ].

Identification systems also can use cloud computing. Alsmirat et al. have shown that digital cameras can act as a fingerprint identification system with an image compression rate of 30–40%, widely available on smartphones. Data security is a significant challenge there as well [ 71 ].

The present study indicates that the most vital challenge in cloud computing technology is maintaining data security. Malicious or negligent individuals may threaten data security. Several solutions provide data security, the most important of which is data encryption [ 20 , 25 , 29 ]. Data encryption is an essential line of protection in cybersecurity architecture. Encryption makes interrupted data use as difficult as possible [ 27 , 28 , 32 ]. Furthermore, data encryption is used to develop an encryption scheme that hypothetically can merely be broken with large amounts of computing potency [ 41 , 42 , 44 , 49 ]. Kaur et al. [ 49 ] and Dorairaj et al. [ 57 ] have stated data encryption as a strategy to protect data against security threats. The results of the current research further show data encryption as the best solution to provide data security.

Many methods have been proposed for data encryption. A four-image encryption scheme has been proposed by Yu et al. based on the computer-generated hologram, quaternion fresnel transforms (QFST), and two-dimensional (2D) logistic-adjusted-sine map (LASM). This innovative technology considerably decreases the key data sent to the receiver for decryption, making it more promising to be stored and transmitted [ 72 ]. In order to secure cloud data storage and its delivery to authorized users, a hierarchal identity-based cryptography method has been proposed by Kaushik et al. to assure that a malicious attacker or CSP does not change for its benefit [ 73 ].

Another research has proposed a method to avoid always using the upstream communication channel from the clients to the cloud server via an optimistic concurrency control protocol, which reduces communication delay for IoT users. Only update transactions are sent to the cloud using this method, and they are only partially validated at the fog node [ 74 ].

According to the present research results, confidentiality is the second most important challenge in cloud technology. It refers to the protection of data from being obtained by unauthorized individuals; in other words, sensitive information is only accessible by authorized persons [ 75 ]. Cloud data control can result in an increased risk of data compromise. To ensure that the patient-doctor relationship runs smoothly, patients must have faith in the healthcare system to keep their data private [ 17 ]. Studies have shown that confidentiality may be achieved by access control [ 52 , 62 ] and authentication [ 45 , 76 ]. A Mutual Authentication and Secret Key (MASK) establishment protocol has been presented by Masud et al. in the field of the Internet of Medical Things (IoMT) in COVID-19 patients. The proposed protocol uses Physical Unclonable Functions (PUF) to enable the network devices to validate the doctor legitimacy (user) and sensor node before establishing a session key. Therefore, it addresses the confidentiality, authentication, and integrity problems and secures the sensitive health information of the patients [ 77 ].

This research shows that integrity, availability, and network security are important issues in the cloud computing infrastructure. A developmental study has mentioned integrity and availability as challenging problems in implementing cloud-based services, especially when losing or leaking information could result in major legal- or business-related damage [ 34 ]. Confidentiality, Integrity, and Availability (CIA) have been reported as the main three factors in cloud system security, which are considered here for the evaluation [ 33 ].

The number of network security challenges has rapidly increased with the advent of wireless sensor networks [ 22 , 24 ]. Therefore, network security in cloud infrastructure has become a challenge for organizations [ 41 , 43 ]. The common network attacks have happened at the network layer, including IP spoofing, port scanning, man-in-middle attack, address resolution protocol (ARP) spoofing, routing information protocol (RIP) attack, denial of service (DoS), and distributed denial of service (DDoS) [ 58 ]. The attackers, for instance, can send a considerable number of requests in order to access virtual machines in cloud computing to restrict their availability to valid users; this is termed the DoS attack. The availability of cloud resources is targeted by this attack [ 63 ]. The related studies have shown that no specific security standard exists for security controls in wireless networks [ 24 , 51 , 63 ]. However, in order to keep security in cloud computing networks, potential solutions, including Application Programming Interfaces (API), data classification, and security management protocol, could be applied [ 60 , 64 , 78 , 79 ].

Limitations

Due to the nature of the solution protocols, we could not explain their details. We aimed to clarify the present challenges and possible solutions to help others address and work on the issues, thus skipping some details and protocols presented for solutions. We only reviewed the English studies, thus possibly missing some reports.

Cloud computing offers various benefits in data access and storage, particularly to healthcare organizations and relevant studies. Although the cloud computing environment is considered as a potential Internet-based computing platform, the security concerns encountered are notable. Security concerns may occur as a result of the cloud computing paradigm's shared, virtualized, and public nature. Overcoming these challenges by developing novel solutions is the only option for cloud computing adoption. All users, individuals or organizations, should be well informed of the security risks in the cloud.

In this study, an overview of cloud computing is presented; also, its security challenges and solutions surfaced within the past five years are reviewed. In order to offer safe data access, data encryption can be utilized to store and retrieve data from the cloud. We have also gone through some of the major challenges that make cloud security engineering tough. Identifying these challenges is the first step to tackle them, and future studies need to provide more feasible solutions to fix such bugs.

Acknowledgments

The present study was extracted from the research project with the IR.KHALUMS.REC.1400.001 code entitled "Investigating the necessary infrastructure for implementing cloud computing technology in Khalkhal University of Medical Sciences" conducted at the Khalkhal University of Medical Sciences in 2021.

Conflict of interest

The authors declare that there is no conflict of interest.

Captcha Page

We apologize for the inconvenience...

To ensure we keep this website safe, please can you confirm you are a human by ticking the box below.

If you are unable to complete the above request please contact us using the below link, providing a screenshot of your experience.

https://ioppublishing.org/contacts/

HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment

  • Published: 17 September 2024

Cite this article

security issues in cloud computing research paper 2021

  • Pawan Kumar 1 &
  • Ashutosh Kumar Bhatt 2  

Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing, cloud usage has increased, so various vulnerabilities and threats have also been enhanced. Hence, data security and privacy are considered the major issues of multi-tenant environments in the cloud. Several existing studies have developed different mechanisms to solve security issues in multi-tenant cloud environments. However, they faced various problems while improving security, and this led to a lack of confidentiality, authenticity, and data integrity. Thus, this research paper intends to propose an efficient encryption approach for securing data delivery in the cloud with reduced time. For secure data delivery, homomorphic encryption is utilized to encode the cloud server’s data. In homomorphic encryption, four stages are available for data delivery: key generation, encryption, decryption, and evaluation. The main problems in this homomorphic encryption mechanism are key sharing and key management. Due to these problems, the performance of homomorphic encryption is diminished. Thus, the proposed work introduces an Aquila optimizer for the key generation process. In this, optimal keys are selected, and it provides improved data security and privacy for cloud users. Finally, the selected keys are generated for the encryption and decryption process. The efficiency of the proposed approach is proved by comparing the performance in terms of encryption time, decryption time and throughput over the existing schemes like Rivest, Shamir and Adleman, ElGamal, Algebra Homomorphic Encryption scheme based on ElGamal (AHEE) and modified AHEE. The experimental results reveal that the proposed model achieves reduced encryption and decryption time of 972 ms and 4261 ms for the data size ranges from 5 to 25 mb.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

security issues in cloud computing research paper 2021

Explore related subjects

  • Artificial Intelligence

Data Availability

No data Availability.

Guo, Y., Ganti, S., & Wu, Y. (2024). Enhancing energy efficiency in telehealth internet of things systems through fog and cloud computing integration: simulation study. JMIR biomedical engineering, 9 (1), e50175.

Google Scholar  

Venkatachalam, N., Shanmugam, L., Parkavi, K., & Satheeswari, D. (2024). IoT Next gen and the world of big data computing. In  Big Data Computing  (pp. 1–16). CRC Press.

Mahapatra, A., Mishra, K., Pradhan, R., & Majhi, S. K. (2024). Next generation task offloading techniques in evolving computing paradigms: Comparative analysis, current challenges, and future research perspectives. Archives of Computational Methods in Engineering, 31 (3), 1405–1474.

Chauhan, M., & Shiaeles, S. (2023). An analysis of cloud security frameworks, problems and proposed solutions. Network, 3 (3), 422–450.

Kim, J., & Kim, Y. (2016). Benefits of cloud computing adoption for smart grid security from security perspective. The Journal of Supercomputing, 72 , 3522–3534.

Battula, M. (2024). A systematic review on a multi-tenant database management system in cloud computing. In  2024 international conference on cognitive robotics and intelligent systems (ICC-ROBINS) , 890–897. IEEE.

Adeniyi, E. A., Ogundokun, R. O., Misra, S., Awotunde, J. B., & Abiodun, K. M. (2022). Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology. In S. Misra & A. K. Tyagi (Eds.), Blockchain applications in the smart era (pp. 65–83). Cham: Springer International Publishing.

Kudari, R., Reddy, D. A., & Krishna, G. R. (2022). Collaborative Network Security for Virtual Machine in Cloud Computing for Multi-tenant Data Center. In: Machine Intelligence and Smart Systems: Proceedings of MISS 2021 , 341–349. Singapore: Springer Nature Singapore.

Deochake, S., & Channapattan, V. (2022). Identity and access management framework for multi-tenant resources in hybrid cloud computing. In Proceedings of the 17th International Conference on Availability, Reliability and Security , 1–8.

Bindu Madavi, K. P., Neelaveni, P., Rakesh, P., & Asish, S. (2024). Security and privacy issues in cloud and IoT technology and their countermeasures. In A. Prasad (Ed.), Communication technologies and security challenges in IoT: Present and future (pp. 107–129). Singapore: Springer Nature Singapore.

Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (2024). Information security risk assessment methods in cloud computing: comprehensive review. Journal of Computer Information Systems . https://doi.org/10.1080/08874417.2024.2329985

Polkowski, Z., Nycz-Lukaszewska, M. (2020). Infrastructure as a service: Cloud computing model for micro companies. In Advances in Data Science and Management: Proceedings of ICDSM 2019 pp. 307–320. Springer Singapore, 2020.

Matarneh, A. J., AlTahat, S. S., Ali, O. A., & Jwaifel, I. (2019). The real intellectual impact of cloud accounting in achieving the competitive advantage in the jordanian industrial companies. International Journal of Science and Technology Research, 8 , 1763.

Manthiramoorthy, C., & Khan, K. M. S. (2024). Comparing several encrypted cloud storage platforms. International Journal of Mathematics, Statistics, and Computer Science, 2 , 44–62.

Ogiela, U. (2020). Cognitive cryptography for data security in cloud computing. Concurrency and Computation: Practice and Experience, 32 (18), e5557.

Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management., 50 , 387–394.

Chinnasamy, P., Padmavathi, S., Swathy, R., Rakesh, S. (2021). Efficient Data Security Using Hybrid Cryptography on Cloud Computing. In Inventive Communication and Computational Technologies. Springer, Singapore 537–547.

Akyol, S. (2023). A new hybrid method based on Aquila optimizer and tangent search algorithm for global optimization. Journal of Ambient Intelligence and Humanized Computing, 14 (6), 8045–8065.

Nematollahi, M., Ghaffari, A., & Mirzaei, A. (2024). Task offloading in Internet of Things based on the improved multi-objective aquila optimizer. Signal, Image and Video Processing, 18 (1), 545–552.

Kumar, P., & Bhatt, A. K. (2020). Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Communications., 14 (18), 3212–3222.

Veerabathiran, V. K., Mani, D., Kuppusamy, S., Subramaniam, B., Velayutham, P., Sengan, S., & Krishnamoorthy, S. (2020). Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Computing, 24 (24), 18893–18908.

Gupta, L.M., Garg, H., Samad, A. (2021). Secure group data sharing with an efficient key management without re-encryption scheme in cloud computing. In Proceedings of Second international conference on computing, communications, and cyber-security. Springer, Singapore 265–277.

Alabdulatif, A., Khalil, I., & Yi, X. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137 , 192–204.

Sammeta, N., & Parthiban, L. (2021). Medical data analytics for secure multi-party-primarily based cloud computing utilizing homomorphic encryption. Journal of Scientific and Industrial Research (JSIR), 80 (08), 692–698.

Zhu, K., Wang, Z., Ding, D., Dong, H., & Xu, C. Z. (2024). Secure state estimation for artificial neural networks with unknown-but-bounded noises: a homomorphic encryption scheme. IEEE Transactions on Neural Networks and Learning Systems . https://doi.org/10.1109/TNNLS.2024.3389873

Vangujar, A. K., Ganesh, B., Umrani, A., & Palmieri, P. (2023). A novel approach to e-voting with group identity based identification and homomorphic encryption.  Cryptology ePrint Archive .

Download references

No funding is provided for the preparation of the manuscript.

Author information

Authors and affiliations.

Uttarakhand Technical University, Dehradun, India

Pawan Kumar

School of Computer Sciences and Information Technology, Uou, Haldwani, India

Ashutosh Kumar Bhatt

You can also search for this author in PubMed   Google Scholar

Contributions

All authors are equal contributions in this work.

Corresponding author

Correspondence to Pawan Kumar .

Ethics declarations

Conflict of interest.

Authors Mr. Pawan Kumar & Dr. Ashutosh Kumar Bhatt declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to Participate

All the authors involved have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Kumar, P., Bhatt, A.K. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment. Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-11565-7

Download citation

Accepted : 02 September 2024

Published : 17 September 2024

DOI : https://doi.org/10.1007/s11277-024-11565-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cloud computing
  • Key generation
  • Homomorphic encryption
  • Aquila optimization
  • Optimal keys
  • Find a journal
  • Publish with us
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Journal Proposal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

futureinternet-logo

Article Menu

security issues in cloud computing research paper 2021

  • Subscribe SciFeed
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Edge computing in healthcare: innovations, opportunities, and challenges.

security issues in cloud computing research paper 2021

1. Introduction

  • An overview of core concepts related to edge computing, highlighting characteristics, use cases, and challenges.
  • The definition of a systematic review methodology based on PRISMA by defining a set of research questions and clear inclusion/exclusion criteria.
  • An analysis and classification of the selected articles considering the most important research topics, the used techniques, identified gaps, and future research.
  • A Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis for a better understanding of edge computing in healthcare research.

2. Edge Computing Overview

2.1. main characteristics.

  • Proximity to data sources: Edge computing brings computation and data storage close to the location where data are generated, allowing real-time processing [ 2 , 14 , 15 ].
  • Reduced latency: One of the most significant advantages of edge computing is its ability to offer low latency by processing data locally rather than sending them to centralized cloud data centers far from the data source. This is critical for delay-sensitive applications [ 3 , 4 , 6 ].
  • Bandwidth reduction: Edge computing reduces the amount of data that must travel over the network, by employing data processing locally, thereby saving bandwidth and reducing network congestion [ 2 , 16 ].
  • Enhanced security and privacy: Processing data locally on edge devices can enhance data security and privacy, as sensitive information does not need to traverse the internet to reach a centralized cloud server. With proper security protocols, data breaches or leaks can be mitigated [ 10 , 16 ].
  • Mobility support: Due to the dynamic nature of edge locations and the devices connected within these networks, edge computing offers robust support for mobility, effectively handling the changing conditions and locations of devices [ 2 , 15 ].
  • Location awareness: Edge computing systems are aware of their geographical location, which can be leveraged to deliver localized services such as content delivery, local resource sharing, and regional data processing [ 17 , 18 ].
  • Heterogeneity: Edge computing can support a diverse range of devices, applications, and services through specific standards and data models [ 2 , 19 ].

2.2. Use Cases and Application Domains

  • allows for real-time decisions and enables for immediate response from professionals.
  • reduces the risk of data breaches by processing and storing personal information at the edge.
  • bandwidth and cost reduction by transmitting only the mandatory information to centralized entities.
  • allows AI model deployment closer to the patient, enables personalization of AI models, and the prediction of health issues based on real-time data from the monitoring devices.

2.3. Challenges

  • Identify the main use cases of edge computing in healthcare.
  • Examine the development of edge computing solutions in healthcare systems.
  • Investigate the technical challenges in the edge computing integration into eHealth systems.
  • Determine the future research directions and potential advancements in edge computing for improving healthcare technologies.
  • Edge Computing Artificial Intelligence Healthcare
  • Edge Computing and Ambient Intelligence
  • Edge Computing and Personalized Care
  • Edge Computing and Active Assisted Living
  • Edge Computing and Ambient Assisted Living
  • Edge Computing and Remote Care
  • Edge Computing Data Privacy and Security Healthcare

4. Literature Review

4.1. privacy and security, 4.2. ai-based optimization in edge environments, 4.3. edge offloading and computational distribution.

PaperTechnologies UsedMain Contribution
[ ]BlockchainArchitecture for secured decentralized system
[ ]Blockchain, NFTsEnsure decentralized and secure resource allocation
[ ]JTOS Reducing delays in critical IoT applications
[ ]SDN, NFVImproved mobility management
[ ]SDN, NFVEnhancing network flexibility
[ ]DL, PNNImproving latency and resource use in fog computing
[ ]DL, CLEnhancing real-time decision-making
[ ]FL, BlockchainImproving latency and data privacy
[ ]FL, UAVCollective data processing
[ ]Neuromorphic HW, DLEnhancing accuracy and reducing power consumption
[ ]CNN, LogNNetNeural Network designed for edge computing, fine-tuned for medical data analysis
[ ]SVM, ANFISFacilitate data processing across layers
[ ]MASEfficient handling of healthcare-related tasks
[ ]Real-time data processing pipelinesImproved efficiency in remote monitoring
[ ]Simulator Edge/Fog Improving latency and data privacy
[ ]Wearable-based chemical sensingEnhanced data processing and analysis techniques
[ ]DPSOOptimizing task distribution
[ ]DAG, S2S, DCPCollaborative and task placement optimization
[ ]SVM, DTReduce network layer overhead
[ ]FL, Personalization techniquesAdapt node to specific needs, enable heterogeneity

5. Discussion

6. conclusions, author contributions, data availability statement, conflicts of interest.

  • Wang, X.; Han, Y.; Leung, V.C.M.; Niyato, D.; Yan, X.; Chen, X. Convergence of Edge Computing and Deep Learning: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020 , 22 , 869–904. [ Google Scholar ] [ CrossRef ]
  • Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge computing: A survey. Future Gener. Comput. Syst. 2019 , 97 , 219–235. [ Google Scholar ] [ CrossRef ]
  • Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2018 , 6 , 6900–6919. [ Google Scholar ] [ CrossRef ]
  • Chen, J.; Ran, X. Deep Learning with Edge Computing: A review. Proc. IEEE 2019 , 107 , 1655–1674. [ Google Scholar ] [ CrossRef ]
  • Alahi, M.E.E.; Sukkuea, A.; Tina, F.W.; Nag, A.; Kurdthongmee, W.; Suwannarat, K.; Mukhopadhyay, S.C. Integration of IoT-Enabled Technologies and Artificial Intelligence (AI) for Smart City Scenario: Recent Advancements and Future Trends. Sensors 2023 , 23 , 5206. [ Google Scholar ] [ CrossRef ]
  • Pan, J.; McElhannon, J. Future Edge Cloud and Edge Computing for Internet of Things Applications. IEEE Internet Things J. 2018 , 5 , 439–449. [ Google Scholar ] [ CrossRef ]
  • Anghel, I.; Cioara, T.; Moldovan, D.; Antal, M.; Pop, C.D.; Salomie, I.; Pop, C.B.; Chifu, V.R. Smart Environments and Social Robots for Age-Friendly Integrated Care Services. Int. J. Environ. Res. Public Health 2020 , 17 , 3801. [ Google Scholar ] [ CrossRef ]
  • Cicirelli, G.; Marani, R.; Petitti, A.; Milella, A.; D’Orazio, T. Ambient Assisted Living: A Review of Technologies, Methodologies and Future Perspectives for Healthy Aging of Population. Sensors 2021 , 21 , 3549. [ Google Scholar ] [ CrossRef ]
  • Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S.; Zomaya, A.Y. Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence. IEEE Internet Things J. 2020 , 7 , 7457–7469. [ Google Scholar ] [ CrossRef ]
  • Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022 , 22 , 927. [ Google Scholar ] [ CrossRef ]
  • Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021 , 372 , n71. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Arcas, G.I.; Cioara, T.; Anghel, I.; Lazea, D.; Hangan, A. Edge Offloading in Smart Grid. Smart Cities 2024 , 7 , 680–711. [ Google Scholar ] [ CrossRef ]
  • Premsankar, G.; Di Francesco, M.; Taleb, T. Edge Computing for the Internet of Things: A Case Study. IEEE Internet Things J. 2018 , 5 , 1275–1284. [ Google Scholar ] [ CrossRef ]
  • Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge Intelligence: Paving the Last Mile of Artificial Intelligence with Edge Computing. Proc. IEEE 2019 , 107 , 1738–1762. [ Google Scholar ] [ CrossRef ]
  • Satyanarayanan, M. The Emergence of Edge Computing. Computer 2017 , 50 , 30–39. [ Google Scholar ] [ CrossRef ]
  • Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet Things J. 2016 , 3 , 637–646. [ Google Scholar ] [ CrossRef ]
  • Sun, X.; Ansari, N. EdgeIoT: Mobile Edge Computing for the Internet of Things. IEEE Commun. Mag. 2016 , 54 , 22–29. [ Google Scholar ] [ CrossRef ]
  • Shi, W.; Dustdar, S. The Promise of Edge Computing. Computer 2016 , 49 , 78–81. [ Google Scholar ] [ CrossRef ]
  • Ai, Y.; Peng, M.; Zhang, K. Edge Computing Technologies for Internet of Things: A Primer. Digit. Commun. Netw. 2018 , 4 , 77–86. [ Google Scholar ] [ CrossRef ]
  • Arcas, G.I.; Cioara, T.; Anghel, I. Whale Optimization for Cloud–Edge-Offloading Decision-Making for Smart Grid Services. Biomimetics 2024 , 9 , 302. [ Google Scholar ] [ CrossRef ]
  • Dastjerdi, A.V.; Buyya, R. Fog Computing: Helping the Internet of Things Realize Its Potential. Computer 2016 , 49 , 112–116. [ Google Scholar ] [ CrossRef ]
  • Li, H.; Ota, K.; Dong, M. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing. IEEE Netw. 2018 , 32 , 96–101. [ Google Scholar ] [ CrossRef ]
  • Qureshi, R.; Irfan, M.; Ali, H.; Khan, A.; Nittala, A.S.; Ali, S.; Shah, A.; Gondal, T.M.; Sadak, F.; Shah, Z.; et al. Artificial Intelligence and Biosensors in Healthcare and Its Clinical Relevance: A Review. IEEE Access 2023 , 11 , 61600–61620. [ Google Scholar ] [ CrossRef ]
  • Rauniyar, A.; Hagos, D.H.; Jha, D.; Håkegård, J.E.; Bagci, U.; Rawat, D.B.; Vlassov, V. Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions. IEEE Internet Things J. 2024 , 11 , 7374–7398. [ Google Scholar ] [ CrossRef ]
  • Ekiz, D.; Can, Y.S.; Dardagan, Y.C.; Ersoy, C. Can a Smartband be Used for Continuous Implicit Authentication in Real Life? IEEE Access 2020 , 8 , 59402–59411. [ Google Scholar ] [ CrossRef ]
  • Zhang, Y.; Wei, X.; Cao, J.; Ning, J.; Ying, Z.; Zheng, D. Blockchain-Enabled Decentralized Attribute-Based Access Control with Policy Hiding for Smart Healthcare. J. King Saud Univ.-Comput. Inf. Sci. 2022 , 34 Pt A , 8350–8361. [ Google Scholar ] [ CrossRef ]
  • Mandarino, V.; Pappalardo, G.; Tramontana, E. A Blockchain-Based Electronic Health Record (EHR) System for Edge Computing Enhancing Security and Cost Efficiency. Computers 2024 , 13 , 132. [ Google Scholar ] [ CrossRef ]
  • Akkaoui, R.; Hei, X.; Cheng, W. EdgeMediChain: A Hybrid Edge Blockchain-Based Framework for Health Data Exchange. IEEE Access 2020 , 8 , 113467–113486. [ Google Scholar ] [ CrossRef ]
  • Rani, S.; Kataria, A.; Kumar, S.; Tiwari, P. Federated Learning for Secure IoMT-Applications in Smart Healthcare Systems: A Comprehensive Review. Knowl.-Based Syst. 2023 , 274 , 110658. [ Google Scholar ] [ CrossRef ]
  • Mayer, A.H.; Rodrigues, V.F.; da Costa, C.A.; da Rosa Righi, R.; Roehrs, A.; Antunes, R.S. FogChain: A Fog Computing Architecture Integrating Blockchain and Internet of Things for Personal Health Records. IEEE Access 2021 , 9 , 122723–122737. [ Google Scholar ] [ CrossRef ]
  • Ejaz, M.; Kumar, T.; Kovacevic, I.; Ylianttila, M.; Harjula, E. Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications. Sensors 2021 , 21 , 2502. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Annane, B.; Alti, A.; Lakehal, A. Blockchain-Based Context-Aware CP-ABE Schema for Internet of Medical Things Security. Array 2022 , 14 , 100150. [ Google Scholar ] [ CrossRef ]
  • Dammak, B.; Turki, M.; Cheikhrouhou, S.; Baklouti, M.; Mars, R.; Dhahbi, A. LoRaChainCare: An IoT Architecture Integrating Blockchain and LoRa Network for Personal Health Care Data Monitoring. Sensors 2022 , 22 , 1497. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Papadopoulos, G.T.; Antona, M.; Stephanidis, C. Towards Open and Expandable Cognitive AI Architectures for Large-Scale Multi-Agent Human-Robot Collaborative Learning. IEEE Access 2021 , 9 , 73890–73909. [ Google Scholar ] [ CrossRef ]
  • Humayun, M.; Alsirhani, A.; Alserhani, F.; Shaheen, M.; Alwakid, G. Transformative synergy: SSEHCET—Bridging mobile edge computing and AI for enhanced eHealth security and efficiency. J. Cloud Comput. 2024 , 13 , 37. [ Google Scholar ] [ CrossRef ]
  • Chamikara, M.A.P.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S. Privacy preserving distributed machine learning with federated learning. Comput. Commun. 2021 , 171 , 112–125. [ Google Scholar ] [ CrossRef ]
  • Attaullah, H.; Anjum, A.; Kanwal, T.; Malik, S.U.R.; Asheralieva, A.; Malik, H.; Zoha, A.; Arshad, K.; Imran, M.A. F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 2021 , 21 , 4933. [ Google Scholar ] [ CrossRef ]
  • Rachakonda, L.; Bapatla, A.K.; Mohanty, S.P.; Kougianos, E. SaYoPillow: Blockchain-Integrated Privacy-Assured IoMT Framework for Stress Management Considering Sleeping Habits. IEEE Trans. Consum. Electron. 2021 , 67 , 20–29. [ Google Scholar ] [ CrossRef ]
  • Sánchez-Gallegos, D.D.; Galaviz-Mosqueda, G.; González, J.L.; Villarreal, S.; Perez-Ramos, A.-E.; Carrizales-Espinoza, D.; Carretero, J. On the Continuous Processing of Health Data in Edge-Fog-Cloud Computing by Using Micro/Nanoservice Composition. IEEE Access 2020 , 8 , 120255–120281. [ Google Scholar ] [ CrossRef ]
  • Loghin, D.; Ta, Q.-T.; Wang, W.; Xiao, X.; Yang, Y.; Zhang, M.; Zhang, Z.; Cai, S.; Chen, G.; Dinh, A.; et al. The Disruptions of 5G on Data-Driven Technologies and Applications. IEEE Trans. Knowl. Data Eng. 2020 , 32 , 1179–1198. [ Google Scholar ] [ CrossRef ]
  • Rathore, S.; Park, J.H.; Chang, H. Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT. IEEE Access 2021 , 9 , 90075–90083. [ Google Scholar ] [ CrossRef ]
  • Akter, M.; Moustafa, N.; Turnbull, B. SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems. Cogn. Comput. 2024 , 16 , 2626–2641. [ Google Scholar ] [ CrossRef ]
  • Saheed, Y.K.; Arowolo, M.O. Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms. IEEE Access 2021 , 9 , 161546–161554. [ Google Scholar ] [ CrossRef ]
  • Ferrag, M.A.; Friha, O.; Maglaras, L.; Janicke, H.; Shu, L. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 2021 , 9 , 138509–138542. [ Google Scholar ] [ CrossRef ]
  • Raza, A.; Tran, K.P.; Koehl, L.; Li, S. AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description. Eng. Appl. Artif. Intell. 2023 , 121 , 106051. [ Google Scholar ] [ CrossRef ]
  • Abdullah, S.; Arshad, J.; Khan, M.M.; Alazab, M.; Salah, K. PRISED tangle: A privacy-aware framework for smart healthcare data sharing using IOTA tangle. Complex. Intell. Syst. 2023 , 9 , 3023–3041. [ Google Scholar ] [ CrossRef ]
  • Zubair, M.; Ghubaish, A.; Unal, D.; Al-Ali, A.; Reimann, T.; Alinier, G.; Hammoudeh, M.; Qadir, J. Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System. Sensors 2022 , 22 , 8280. [ Google Scholar ] [ CrossRef ]
  • Rehman, A.; Saba, T.; Haseeb, K.; Alam, T.; Lloret, J. Sustainability Model for the Internet of Health Things (IoHT) Using Reinforcement Learning with Mobile Edge Secured Services. Sustainability 2022 , 14 , 12185. [ Google Scholar ] [ CrossRef ]
  • Zhang, J.; Ouda, A.; Abu-Rukba, R. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks. Future Internet 2024 , 16 , 209. [ Google Scholar ] [ CrossRef ]
  • Hernandez-Jaimes, M.L.; Martinez-Cruz, A.; Ramírez-Gutiérrez, K.A.; Feregrino-Uribe, C. Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures. Internet Things 2023 , 23 , 100887. [ Google Scholar ] [ CrossRef ]
  • Zhang, J.; Zhang, F.; Huang, X.; Liu, X. Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Trans. Dependable Secur. Comput. 2021 , 18 , 2835–2847. [ Google Scholar ] [ CrossRef ]
  • Ullah, I.; Khan, M.A.; Alkhalifah, A.; Nordin, R.; Alsharif, M.H.; Alghtani, A.H.; Aly, A.A. A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications. Sustainability 2021 , 13 , 13184. [ Google Scholar ] [ CrossRef ]
  • Zhang, L.; Wang, X.; Wang, J.; Pung, R.; Wang, H.; Lam, K.-Y. An Efficient FHE-Enabled Secure Cloud–Edge Computing Architecture for IoMT Data Protection with its Application to Pandemic Modeling. IEEE Internet Things J. 2024 , 11 , 15272–15284. [ Google Scholar ] [ CrossRef ]
  • Scrugli, M.A.; Loi, D.; Raffo, L.; Meloni, P. An Adaptive Cognitive Sensor Node for ECG Monitoring in the Internet of Medical Things. IEEE Access 2022 , 10 , 1688–1705. [ Google Scholar ] [ CrossRef ]
  • Djelouat, H.; Al Disi, M.; Boukhenoufa, I.; Amira, A.; Bensaali, F.; Kotronis, C.; Politi, E.; Nikolaidou, M.; Dimitrakopoulos, G. Real-time ECG monitoring using compressive sensing on a heterogeneous multicore edge-device. Microprocess. Microsyst. 2020 , 72 , 102839. [ Google Scholar ] [ CrossRef ]
  • Irshad, R.R.; Hussain, S.; Sohail, S.S.; Zamani, A.S.; Madsen, D.Ø.; Alattab, A.A.; Ahmed, A.A.A.; Norain, K.A.A.; Alsaiari, O.A.S. A Novel IoT-Enabled Healthcare Monitoring Framework and Improved Grey Wolf Optimization Algorithm-Based Deep Convolution Neural Network Model for Early Diagnosis of Lung Cancer. Sensors 2023 , 23 , 2932. [ Google Scholar ] [ CrossRef ]
  • Sakib, S.; Fouda, M.M.; Al-Mahdawi, M.; Mohsen, A.; Oogane, M.; Ando, Y.; Fadlullah, Z.M. Deep Learning Models for Magnetic Cardiography Edge Sensors Implementing Noise Processing and Diagnostics. IEEE Access 2022 , 10 , 2656–2668. [ Google Scholar ] [ CrossRef ]
  • Velichko, A.; Huyut, M.T.; Belyaev, M.; Izotov, Y.; Korzun, D. Machine Learning Sensors for Diagnosis of COVID-19 Disease Using Routine Blood Values for Internet of Things Application. Sensors 2022 , 22 , 7886. [ Google Scholar ] [ CrossRef ]
  • Hemalatha, M. A hybrid random forest deep learning classifier empowered edge cloud architecture for COVID-19 and pneumonia detection. Expert Syst. Appl. 2022 , 210 , 118227. [ Google Scholar ] [ CrossRef ]
  • Antal, C.; Cioara, T.; Antal, M.; Anghel, I. Blockchain Platform For COVID-19 Vaccine Supply Management. IEEE Open J. Comput. Soc. 2021 , 2 , 164–178. [ Google Scholar ] [ CrossRef ]
  • Badawy, M.; Balaha, H.M.; Maklad, A.S.; Almars, A.M.; Elhosseini, M.A. Revolutionizing Oral Cancer Detection: An Approach Using Aquila and Gorilla Algorithms Optimized Transfer Learning-Based CNNs. Biomimetics 2023 , 8 , 499. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Wan, S.; Gu, Z.; Ni, Q. Cognitive computing and wireless communications on the edge for healthcare service robots. Comput. Commun. 2020 , 149 , 99–106. [ Google Scholar ] [ CrossRef ]
  • Kim, J.; Kang, H.; Yang, J.; Jung, H.; Lee, S.; Lee, J. Multitask Deep Learning for Human Activity, Speed, and Body Weight Estimation Using Commercial Smart Insoles. IEEE Internet Things J. 2023 , 10 , 16121–16133. [ Google Scholar ] [ CrossRef ]
  • Alekseeva, D.; Ometov, A.; Arponen, O.; Lohan, E.S. The future of computing paradigms for medical and emergency applications. Comput. Sci. Rev. 2022 , 45 , 100494. [ Google Scholar ] [ CrossRef ]
  • Wang, W.-H.; Hsu, W.-S. Integrating Artificial Intelligence and Wearable IoT System in Long-Term Care Environments. Sensors 2023 , 23 , 5913. [ Google Scholar ] [ CrossRef ]
  • Elbagoury, B.M.; Vladareanu, L.; Vlădăreanu, V.; Salem, A.B.; Travediu, A.-M.; Roushdy, M.I. A Hybrid Stacked CNN and Residual Feedback GMDH-LSTM Deep Learning Model for Stroke Prediction Applied on Mobile AI Smart Hospital Platform. Sensors 2023 , 23 , 3500. [ Google Scholar ] [ CrossRef ]
  • Paramasivam, A.; Shahila, D.F.D.; Jenath, M.; Sivakumaran, T.S.; Sankaran, S.; Reddy Pittu, P.S.K.; Vijayalakshmi, S. Development of artificial intelligence edge computing based wearable device for fall detection and prevention of elderly people. Heliyon 2024 , 10 , e28688. [ Google Scholar ]
  • Monti, L.; Tse, R.; Tang, S.-K.; Mirri, S.; Delnevo, G.; Maniezzo, V.; Salomoni, P. Edge-Based Transfer Learning for Classroom Occupancy Detection in a Smart Campus Context. Sensors 2022 , 22 , 3692. [ Google Scholar ] [ CrossRef ]
  • Wilhelm, S.; Kasbauer, J. Exploiting Smart Meter Power Consumption Measurements for Human Activity Recognition (HAR) with a Motif-Detection-Based Non-Intrusive Load Monitoring (NILM) Approach. Sensors 2021 , 21 , 8036. [ Google Scholar ] [ CrossRef ]
  • Janbi, N.; Mehmood, R.; Katib, I.; Albeshri, A.; Corchado, J.M.; Yigitcanlar, T. Imtidad: A Reference Architecture and a Case Study on Developing Distributed AI Services for Skin Disease Diagnosis over Cloud, Fog and Edge. Sensors 2022 , 22 , 1854. [ Google Scholar ] [ CrossRef ]
  • Chen, M.; Zhou, P.; Wu, D.; Hu, L.; Hassan, M.M.; Alamri, A. AI-Skin: Skin disease recognition based on self-learning and wide data collection through a closed-loop framework. Inf. Fusion 2020 , 54 , 1–9. [ Google Scholar ] [ CrossRef ]
  • Jain, V.; Gupta, G.; Gupta, M.; Sharma, D.K.; Ghosh, U. Ambient intelligence-based multimodal human action recognition for autonomous systems. ISA Trans. 2023 , 132 , 94–108. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Arikumar, K.S.; Prathiba, S.B.; Alazab, M.; Gadekallu, T.R.; Pandya, S.; Khan, J.M.; Moorthy, R.S. FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems. Sensors 2022 , 22 , 1377. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Kumar, A.; Sharma, K.; Sharma, A. Genetically optimized Fuzzy C-means data clustering of IoMT-based biomarkers for fast affective state recognition in intelligent edge analytics. Appl. Soft Comput. 2021 , 109 , 107525. [ Google Scholar ] [ CrossRef ]
  • Sodhro, A.H.; Zahid, N. AI-Enabled Framework for Fog Computing Driven E-Healthcare Applications. Sensors 2021 , 21 , 8039. [ Google Scholar ] [ CrossRef ]
  • Lakhan, A.; Sodhro, A.H.; Majumdar, A.; Khuwuthyakorn, P.; Thinnukool, O. A Lightweight Secure Adaptive Approach for Internet-of-Medical-Things Healthcare Applications in Edge-Cloud-Based Networks. Sensors 2022 , 22 , 2379. [ Google Scholar ] [ CrossRef ]
  • Kumar, A.; Krishnamurthi, R.; Nayyar, A.; Sharma, K.; Grover, V.; Hossain, E. A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes. IEEE Access 2020 , 8 , 118433–118471. [ Google Scholar ] [ CrossRef ]
  • Maksymyuk, T.; Gazda, J.; Bugár, G.; Gazda, V.; Liyanage, M.; Dohler, M. Blockchain-Empowered Service Management for the Decentralized Metaverse of Things. IEEE Access 2022 , 10 , 99025–99037. [ Google Scholar ] [ CrossRef ]
  • Lakhan, A.; Mohammed, M.A.; Abdulkareem, K.H.; Jaber, M.M.; Nedoma, J.; Martinek, R.; Zmij, P. Delay Optimal Schemes for Internet of Things Applications in Heterogeneous Edge Cloud Computing Networks. Sensors 2022 , 22 , 5937. [ Google Scholar ] [ CrossRef ]
  • Bojović, P.D.; Malbašić, T.; Vujošević, D.; Martić, G.; Bojović, Ž. Dynamic QoS Management for a Flexible 5G/6G Network Core: A Step toward a Higher Programmability. Sensors 2022 , 22 , 2849. [ Google Scholar ] [ CrossRef ]
  • Kim, J.A.; Park, D.G.; Jeong, J. Design and performance evaluation of cost-effective function-distributed mobility management scheme for software-defined smart factory networking. J. Ambient. Intell. Humaniz. Comput. 2020 , 11 , 2291–2307. [ Google Scholar ] [ CrossRef ]
  • Pandya, S.; Srivastava, G.; Jhaveri, R.; Babu, M.R.; Bhattacharya, S.; Maddikunta, P.K.R.; Mastorakis, S.; Piran, M.J.; Gadekallu, T.R. Federated learning for smart cities: A comprehensive survey. Sustain. Energy Technol. Assess. 2023 , 55 , 102987. [ Google Scholar ] [ CrossRef ]
  • Talaat, F.M. Effective prediction and resource allocation method (EPRAM) in fog computing environment for smart healthcare system. Multimed. Tools Appl. 2022 , 81 , 8235–8258. [ Google Scholar ] [ CrossRef ]
  • Shumba, A.-T.; Montanaro, T.; Sergi, I.; Fachechi, L.; De Vittorio, M.; Patrono, L. Leveraging IoT-Aware Technologies and AI Techniques for Real-Time Critical Healthcare Applications. Sensors 2022 , 22 , 7675. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Nasser, N.; Fadlullah, Z.M.; Fouda, M.M.; Ali, A.; Imran, M. A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept. Comput. Netw. 2022 , 205 , 108672. [ Google Scholar ] [ CrossRef ]
  • Lin, B.; Yu, T.; Peng, C.; Lin, C.; Hsu, H.; Lee, I.; Zhang, Z. Fall Detection System with Artificial Intelligence-Based Edge Computing. IEEE Access 2022 , 10 , 4328–4339. [ Google Scholar ] [ CrossRef ]
  • Velichko, A. A Method for Medical Data Analysis Using the LogNNet for Clinical Decision Support Systems and Edge Computing in Healthcare. Sensors 2021 , 21 , 6209. [ Google Scholar ] [ CrossRef ]
  • Shynu, P.G.; Menon, V.G.; Kumar, R.L.; Kadry, S.; Nam, Y. Blockchain-Based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing. IEEE Access 2021 , 9 , 45706–45720. [ Google Scholar ] [ CrossRef ]
  • Mutlag, A.A.; Ghani, M.K.A.; Mohammed, M.A.; Lakhan, A.; Mohd, O.; Abdulkareem, K.H.; Garcia-Zapirain, B. Multi-Agent Systems in Fog–Cloud Computing for Critical Healthcare Task Management Model (CHTM) Used for ECG Monitoring. Sensors 2021 , 21 , 6923. [ Google Scholar ] [ CrossRef ]
  • Gómez-Valiente, P.; Benedí, J.P.; Lillo-Castellano, J.M.; Marina-Breysse, M. Smart-IoT Business Process Management: A Case Study on Remote Digital Early Cardiac Arrhythmia Detection and Diagnosis. IEEE Internet Things J. 2023 , 10 , 16744–16757. [ Google Scholar ] [ CrossRef ]
  • Hassan, S.R.; Ahmad, I.; Ahmad, S.; Alfaify, A.; Shafiq, M. Remote Pain Monitoring Using Fog Computing for e-Healthcare: An Efficient Architecture. Sensors 2020 , 20 , 6574. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Wen, F.; He, T.; Liu, H.; Chen, H.-Y.; Zhang, T.; Lee, C. Advances in Chemical Sensing Technology for Enabling the Next-Generation Self-Sustainable Integrated Wearable System in the IoT Era. Nano Energy 2020 , 78 , 105155. [ Google Scholar ] [ CrossRef ]
  • Syed Sabir Mohamed, S.; Gopi, R.; Thiruppathy Kesavan, V.; Kaliyaperumal, K. Adaptive heuristic edge assisted fog computing design for healthcare data optimization. J. Cloud Comput. 2024 , 13 , 127. [ Google Scholar ]
  • Liu, Q.; Tian, Z.; Wang, N.; Lin, Y. DRL-based dependent task offloading with delay-energy tradeoff in medical image edge computing. Complex. Intell. Syst. 2024 , 10 , 3283–3304. [ Google Scholar ] [ CrossRef ]
  • Kumar, R.H.; Rajaram, B. Design and Simulation of an Edge Compute Architecture for IoT-Based Clinical Decision Support System. IEEE Access 2024 , 12 , 45456–45474. [ Google Scholar ] [ CrossRef ]
  • Sachin, D.N.; Annappa, B.; Hegde, S.; Abhijit, C.S.; Ambesange, S. FedCure: A Heterogeneity-Aware Personalized Federated Learning Framework for Intelligent Healthcare Applications in IoMT Environments. IEEE Access 2024 , 12 , 15867–15883. [ Google Scholar ]

Click here to enlarge figure

Screening Phase Inclusion CriteriaEligibility Phase Exclusion Criteria
Type of paper: ArticleNot available (could not be retrieved)
Timeline: 2020–2024Not related to the edge in healthcare topic
Main Research Areas: Computer Science, Engineering, Healthcare SciencesNot connected to the computer science domain
Language: EnglishLow number of citations (for 2020–2023 articles)
High-Impact journals of top 4 publishers: MDPI, IEEE, Elsevier, and SpringerQ3 or lower-quartile-indexed articles
Open Access: Gold and Gold-Hybrid
ArticlesAddressed IssuesSecurity/Privacy/AI Technique/Technology
[ ]Authentication; User privacy and data qualityAuthentication using heart rate variability (HRV) from wearable
devices + ML classifiers
[ ]LRAKE protocol
[ ]EHR data management; Health data privacy; Scalability and compliance with regulationsBlockchain + Attribute-based encryption
[ ]Blockchain
[ ]Privacy-aware FL
[ ]Blockchain + InterPlanetary File System (IPFS)
[ ]Cryptography
[ ]Distributed ledger technologies (DLT) + masked authenticated messaging
[ ]Two-phase encryption + RL
[ ]Blockchain + DApps
[ , , , ]Authorization; Real-time data processing; Privacy; ScalabilityBlockchain + Cryptography
[ ]Differential privacy + six-way authentication
[ ]Symmetric polynomials + NTRU encyption + Symmetric ecryption
[ ]IoMT Data Management; Scalability; Computational overheadBlockchain + FL
[ ]Blockchain + DL
[ ]Certificate-based signcryption
[ ]Blockchain + Smart Agent
[ ]Distributed data privacyDISTPAB algorithm + FL
[ ]5G technologies + FL
[ ]Data privacy; AnonymityF-Classify privacy-preserving model
[ ]Fully homomorphic encryption
[ ]Cyber-attack detection in IoMT; Anomaly detection and pattern recognitionDL + supervised ML + IDS technique
[ ]ML + bio-inspired + IDS techniques
[ ]FL + blockchain + IDS techniques
[ ]Transformer + FL + Support Vector Data Description (SVDD)
[ ]DL + IDS techniques
ArticleHealthcare Use CaseOptimization ObjectiveAlgorithms/Techniques
[ ]Cardiovascular disease monitoringReduce power consumption and optimize computational capabilities of edge devicesCNN
[ ]Lung cancer detectionReduce the computational demand of edge devices; Improve the response time.DCNN + Grey Wolf Optimization
[ ]Detection and classification of arrhythmiasImprove the quality of monitored signals by optimizing edge devices operationCNN + CNN-LSTM + CNN-GRU
[ ]Remote monitoringImprove edge processing time for the detection algorithmsTransfer learning
[ ]COVID-19 detectionImprove classification accuracy on edge devicesLogNNet
[ ]Human activity recognitionOptimize energy efficiency of smart homesNILM
[ ]Skin disease diagnosisImprove energy consumption and response times in distributed edge devicesDL + Tiny AI
[ ]Remote monitoringImprove feature extraction and reduce computational load at the edgeMobileNetV2
[ ]Human activity recognitionOptimize the processing of sensor dataBi-CRNN
[ ]Oral cancer detectionOptimize the image classification task at the edgeCNN + AO + GTO
[ ]Human activity recognitionOptimize distributed data labeling processesFL + DRL
[ ]Real-time health monitoringImprove communication in edge networksCognitive computing
[ ]Emergency IoMTImprove edge processingFL
[ ]COVID-19 and pneumonia diagnosticsImprove communication speed between edge devicesMOMHTS + RF + DL
[ ]Vaccine administration managementImprove throughput and scalability of distributed data sharing and processingBlockchain
[ ]Real-time ECG monitoringReduce energy consumption and hardware requirements on edge devicesGreedy
[ ]Long-term care for eldersOptimize resource allocationDL
[ ]Diagnosis of skin diseasesImprove adaptation of edge resourcesDL
[ ]Affective state recognitionImprove precision and response timeFuzzy C-means
[ ]Remote monitoringImprove edge computation and processingFSIRA
[ ]Stroke predictionReducing the diagnostic time at the edgeLSTM
[ ]Hospital IoMT-enabled data managementOptimize of workflows across edge nodesLSEOS
[ ]Elderly fall detectionReduce and optimize deployment on edge devicesCNN-LSTM with attention layer
StrengthsWeaknessesOpportunitiesThreats
Real-time data monitoring, processing and analysisLimited computational resourcesGrowing demand for remote monitoring and telehealthSecurity and vulnerabilities of healthcare edge devices
Enhanced patient data security and privacyComplex data orchestration and healthcare management processesPersonalized care with edge AI advancementsPatient safety, data privacy, and integrity
Reduced network overheadLow scalabilityGrowth in IoT devices adoption for telecareNetwork infrastructure limitations in data transmission, processing, and intermittent connectivity
Improved reliability for eHealth servicesInteroperability and data integration challenges Development of efficient distributed and federated AI models including LLMsFragmented healthcare systems and vendor lock-in
AI enabled support for healthcare professionals High costs for infrastructure setupAdvancements in data encryptionRegulatory constraints
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Rancea, A.; Anghel, I.; Cioara, T. Edge Computing in Healthcare: Innovations, Opportunities, and Challenges. Future Internet 2024 , 16 , 329. https://doi.org/10.3390/fi16090329

Rancea A, Anghel I, Cioara T. Edge Computing in Healthcare: Innovations, Opportunities, and Challenges. Future Internet . 2024; 16(9):329. https://doi.org/10.3390/fi16090329

Rancea, Alexandru, Ionut Anghel, and Tudor Cioara. 2024. "Edge Computing in Healthcare: Innovations, Opportunities, and Challenges" Future Internet 16, no. 9: 329. https://doi.org/10.3390/fi16090329

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IMAGES

  1. (PDF) A LITERATURE REVIEW ON SECURITY ISSUES IN CLOUD COMPUTING

    security issues in cloud computing research paper 2021

  2. (PDF) Cloud Computing Security Issues, Challenges and Solution

    security issues in cloud computing research paper 2021

  3. (PDF) CLOUD COMPUTING SECURITY: AN INVESTIGATION INTO THE SECURITY

    security issues in cloud computing research paper 2021

  4. Top 5 Cloud Computing Security Issues in 2021

    security issues in cloud computing research paper 2021

  5. (PDF) Issues and Challenges of Security in Cloud Computing Environment

    security issues in cloud computing research paper 2021

  6. (PDF) OVERVIEW OF CLOUD COMPUTING SECURITY WITH ISSUES AND CHALLENGES

    security issues in cloud computing research paper 2021

VIDEO

  1. Cloud Computing Research paper presentation

  2. Enhancing Cloud Security: What's New in Microsoft Defender for Cloud

  3. Cloud Introduction to Data Security

  4. Regulatory Issues Cloud Computing

  5. Cloud Computing Tutorial for Beginners

  6. Get 90% off on the Multi-Cloud Red Team Analyst (MCRTA) course 💥

COMMENTS

  1. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...

  2. Security and privacy protection in cloud computing: Discussions and

    7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.

  3. (PDF) A Systematic Literature Review on Cloud Computing Security

    The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on ...

  4. Data Security and Privacy Issues in Cloud Computing: Challenges and

    This research report systematically investigates various challenges and vulnerabilities in cloud computing, focusing on security and privacy issues. This study comprehensively examines potential ...

  5. Cloud Computing Security Challenges and Solutions

    in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a ...

  6. A survey on security challenges in cloud computing: issues, threats

    Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing ...

  7. Cloud computing security: A survey of service-based models

    In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS. 1.

  8. (PDF) A Systematic Literature Review on Cloud Computing Security

    This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and countermeasures. The security challenges in cloud computing are formidable, especially for public clouds whose infrastructure and computational resources are owned by an outside party that sells ...

  9. Security and Privacy in Cloud Computing: Technical Review

    Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and ...

  10. A New Secure Model for Data Protection over Cloud Computing

    The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents ...

  11. Systematic Literature Review on Cloud Computing Security ...

    However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies.

  12. Information security and privacy challenges of cloud computing for

    The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and public institutions (government) and raised the demand for communication and access to a shared pool of resources and storage capabilities. Governments across the globe are moving to the cloud to improve services, reduce costs, and increase ...

  13. Proceedings of the 2021 on Cloud Computing Security Workshop

    Downloads (cumulative) 3,890. 2021. Abstract. It is our great pleasure to welcome you to the 12th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including: Side channel attacks.

  14. [2108.09508] Data Security and Privacy in Cloud Computing: Concepts and

    Data security and privacy are inevitable requirement of cloud environment. Massive usage and sharing of data among users opens door to security loopholes. This paper envisages a discussion of cloud environment, its utilities, challenges, and emerging research trends confined to secure processing and sharing of data. Comments: 9 pages, 3 figures.

  15. A review on cloud security issues and solutions

    Abstract. Cloud computing provides computing resources, platforms, and applications as a service in a flexible, cost-effective, and efficient way. Cloud computing has integrated with industry and many other fields in recent years, which prompted researchers to look into new technologies. Cloud users have moved their applications, data and ...

  16. Cloud Computing Security Challenges, Threats and Vulnerabilities

    Cloud computing has grown to become an integral part of present as well as future information technologies. This technology has been designed to be used with internet by providing features such as information storage, remote access, etc. Cloud computing has been proved as an effective tool for all the provided services but it also comes with various types of threats. Over the years of its ...

  17. Cyber security: State of the art, challenges and future directions

    Abstract. Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every individual and organization faces continually shifting cyber threats.

  18. PDF A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ...

    The purpose of writing this paper is analyzing the whole cloud computing model security issues. The specific objective is to describe and identify the various attack vectors and security issues ...

  19. Security challenges and solutions using healthcare cloud computing

    This research shows that integrity, availability, and network security are important issues in the cloud computing infrastructure. A developmental study has mentioned integrity and availability as challenging problems in implementing cloud-based services, especially when losing or leaking information could result in major legal- or business ...

  20. Challenges of Data Protection and Security in Cloud Computing

    In a multi-inhabitant world, this paper talks about the various information assurance worries in distributed computing and recommends way to deal with tackle security issues and investigates information insurance. It's an examination about cloud information and part of security identified with it.

  21. Security Issues and Threats in Cloud Computing: Problems and Solutions

    Cloud computing has emerged as a transformative technology, revolutionizing how organizations handle data, applications, and services. However, along with its benefits, cloud computing presents unique security challenges. This research paper explores the various security issues, threats, and potential solutions in cloud computing environments. By examining current trends, industry best ...

  22. Reviews on Security Issues and Challenges in Cloud Computing

    This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data. Export citation and abstract BibTeX RIS.

  23. HE-AO: An Optimization-Based Encryption Approach for Data ...

    Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing ...

  24. Research paper A comprehensive review study of cyber-attacks and cyber

    For example, user permissions when accessing the network or processes that specify when and where information may be stored or shared (Ogbanufe, 2021). Cloud Security: Protects information in the cloud (based on the software), and monitors to remove the on-site attacks risks (Krishnasamy and Venkatachalam, 2021).

  25. Insights Into Cloud Computing: Unveiling Trends ...

    The methodical research provides a comprehensive overview of the current state of cloud computing, with a specific focus on trends, barriers, and potential. This article analyzes advancements in cloud architectures, deployment approaches, and service paradigms, unveiling the latest trends. The study examines the impacts of advanced technologies such as artificial intelligence, serverless ...

  26. Future Internet

    Edge computing promising a vision of processing data close to its generation point, reducing latency and bandwidth usage compared with traditional cloud computing architectures, has attracted significant attention lately. The integration of edge computing in modern systems takes advantage of Internet of Things (IoT) devices and can potentially improve the systems' performance, scalability ...