Annotation: This article provides a systematic taxonomy of cloud computing security issues and related solutions by analyzing the existing body of research and quantifying attention across different concern categories. It highlights key risks such as virtualization vulnerabilities, legal and governance concerns, and data security, illustrating where research is concentrated and where gaps remain. This study is relevant to the topic because it connects specific cloud characteristics (e.g., multi-tenancy and virtualization) with emerging security challenges and helps identify areas needing further research.
Annotation: This critical review examines the most pressing data security issues in cloud computing—such as data leakage, remoteness, privacy, and segregation—by synthesizing findings from recent studies. It also discusses proposed solutions like encryption and access management, situating them within broader cloud security debates. The source is directly relevant because its focus on data security speaks to one of the core concerns obstructing broader adoption and trust in cloud systems.
Annotation: This investigation surveys research on security and privacy concerns unique to multi-tenant cloud environments, where shared infrastructure can permit cross-tenant vulnerabilities and complicate isolation. It covers risks posed by virtualization, shared resources, and identity/access misconfigurations, along with efforts to address these. The study connects directly to your topic by explaining how the cloud’s architectural design creates specific security and privacy challenges.
Annotation: This systematic literature review analyzes cloud data privacy challenges with a focus on homomorphic encryption (HE) as a solution for secure data processing. Reviewing studies published between 2017 and 2024, the authors evaluate different homomorphic encryption approaches—particularly fully homomorphic encryption (FHE)—and assess their performance based on encryption efficiency, execution time, communication overhead, and energy consumption. Although FHE enables computations on encrypted data without exposing plaintext, the study identifies significant computational complexity and performance limitations that restrict real-time implementation. This source is valuable for a research paper on cloud computing issues because it provides an in-depth evaluation of advanced cryptographic solutions while highlighting the practical limitations that still challenge secure cloud adoption.
Annotation: This article examines information security and privacy as primary barriers to government adoption of cloud computing. Using the PRISMA systematic review methodology, the authors screened 758 studies and analyzed 33 relevant articles to identify key challenges affecting cloud adoption in public-sector institutions. The findings reveal that security and privacy concerns account for approximately 70% of the major gaps hindering adoption, with both factors independently contributing significant barriers. The study also emphasizes the absence of comprehensive security frameworks tailored to government cloud implementation. This source strengthens research on cloud computing issues by providing empirical evidence of adoption challenges and underscoring the need for structured policy and security frameworks in public-sector cloud environments.
Annotation: This comprehensive survey examines key security challenges in cloud infrastructure, including multi-tenancy risks, virtualization vulnerabilities, authentication and access control issues, and data confidentiality concerns. The authors also evaluate existing mitigation strategies—such as encryption techniques, intrusion detection systems, and secure virtualization designs—while identifying open research problems. This source is useful for grounding the paper’s discussion in both current security issues and potential technical solutions within cloud computing environments.
Additional Links: