SECURITY ISSUES IN CLOUD COMPUTING USING EDGE COMPUTING AND BLOCKCHAIN: THREAT, MITIGATION, AND FUTURE TRENDS- A SYSTEMATIC LITERATURE REVIEW

被引:2
|
作者
Khan, Muzammil Ahmad [1 ,2 ]
Khan, Shariq Mehmood [2 ]
Subramaniam, Siva Kumar [3 ]
机构
[1] Sir Syed Univ Engn & Technol, Dept Comp Engn, Karachi, Pakistan
[2] NED Univ Engn & Technol, Dept Comp Sci & Informat Technol, Karachi, Pakistan
[3] Univ Tekn Malaysia, Fac Elect & Comp Engn, Melaka, Malaysia
关键词
Cloud computing; edge computing; blockchain; scheduling; QoS; authentication; service level agreement; ARCHITECTURE; MANAGEMENT;
D O I
10.22452/mjcs.vol36no4.1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Within the neoteric decade, cloud computing has grown as emerging technology which is an on-demand availability of network resources, particularly data storage without any management by users. However, the occurrence of security threats and vulnerability has gradually increased in this processing technology due to its notable growth. In addition to that, he existing Systematic Literature Reviews (SLRs) are only limited with cloud related issues and does not provides their impact on other technologies. This Systematic Literature Review (SLR) examines the security threats experienced by cloud computing along with QoS by edge computing and scheduling. Various consumers and cloud service providers (CSP) obtained benefits from the cloud computing environment. However, various privacy and security challenges occur in this digital age. This SLR mainly aims to review the state of the art research studies on secure cloud computing with high QoS and its challenges. This SLR examined numerous research studies related to cloud computing security with secure service level agreement (SLA) which are published between 2019 to 2022 from the reputed electronic databases. Cloud computing security is ensured mostly based on trust evaluation, implementation of blockchain technology, authentication, and cryptography techniques, and implementing edge computing in the cloud environment. This SLR also analyzed the research gaps of the previous research papers and provides future research directions to obtain secure cloud computing environment with high QoS performance.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
    Alouffi, Bader
    Hasnain, Muhammad
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Ayaz, Muhammad
    IEEE ACCESS, 2021, 9 : 57792 - 57807
  • [2] IoT security issues in the context of Edge Computing: A Systematic Review of Literature
    Torres-Carrion, Hernan
    Solano-Chamba, Cecivel
    Narvaez-Guillen, Cristian
    Cueva-Hurtado, Mario
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [3] A Review of Security Issues When Integrating IoT With Cloud Computing and Blockchain
    Albshaier, Latifa
    Budokhi, Alanoud
    Aljughaiman, Ahmed
    IEEE ACCESS, 2024, 12 : 109560 - 109595
  • [4] Cloud Computing: A Systematic Literature Review and Future Agenda
    Omurgonulsen, Mine
    Ibis, Merve
    Kazancoglu, Yigit
    Singla, Pretty
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2021, 29 (06)
  • [5] Mobile cloud computing models security issues: A systematic review
    AlAhmad, Ahmad Salah
    Kahtan, Hasan
    Alzoubi, Yehia Ibrahim
    Ali, Omar
    Jaradat, Ashraf
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 190
  • [6] A Review of Cloud Computing Security Issues
    Kaur, Manpreet
    Singh, Hardeep
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05): : 215 - 222
  • [7] Key Topics in Cloud Computing Security: A Systematic Literature Review
    Benslimane, Y.
    Yang, Z.
    Bahli, B.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 88 - 91
  • [8] Cloud computing security: a taxonomy, threat detection and mitigation techniques
    Rani P.
    Singh S.
    Singh K.
    International Journal of Computers and Applications, 2024, 46 (05) : 348 - 361
  • [9] A Systematic Review of Security in Cloud Computing
    Amoud, Mohamed
    Roudies, Ounsa
    PROCEEDINGS OF THE SECOND INTERNATIONAL AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT (AECIA 2015), 2016, 427 : 69 - 81
  • [10] Security and Privacy Issues in Cloud, Fog and Edge Computing
    Parikh, Shalin
    Dave, Dharmin
    Patel, Reema
    Doshi, Nishant
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 734 - 739