Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 1 , PP: 270-276, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

The Impact of Cloud Computing on Network Security Risk for Organization Behaviours

Nagham Hamid 1 * , Nada Mahdi Kaitan 2 , Sanaa Mohsen 3

  • 1 College of Business Informatics, University of Information Technology and Communications, Baghdad, Iraq - (nagham.finjan@uoitc.edu.iq)
  • 2 College of Business Informatics, University of Information Technology and Communications, Baghdad, Iraq - (nadait.2016@uoitc.edu.iq)
  • 3 College of Business Informatics, University of Information Technology and Communications, Baghdad, Iraq - (sanaa.muhsin@uoitc.edu.iq)
  • Doi: https://doi.org/10.54216/JCIM.150121

    Received: April 14, 2024 Revised: June 12, 2024 Accepted: August 10, 2024
    Abstract

    Cloud computing presents a new trend for IT and business services which typically involves self-service access over internet. Over these features, cloud computing has the advantages to enhance IT and business ways by offering cost efficiency, dynamically scalable, and flexibility. However, using cloud computing has raised the level of the network security risk due to the services are presented by a third party. In addition, to maintain the service availability and support data collections. Understanding these risks through cloud computing help the management to protect their system from security attacks. In this paper, the most serious and important risks and threats of the cloud computing are discussed. The main vulnerabilities is identifying with the literature related to the cloud-computing environment with possible solutions to overcome these threats and risks.

    Keywords :

    Cloud computing , Security risk , Network security , Virtualization

    References

    [1]          Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258. https://doi.org/10.59543/ijmscs.v2i.10377

    [2]          A. E. Youssef and A. M. Mostafa, "Critical Decision-Making on Cloud Computing Adoption in Organizations Based on Augmented Force Field Analysis," in IEEE Access, vol. 7, pp. 167229-167239, 2019.

    [3]          M. Skafi, M. M. Yunis and A. Zekri, "Factors Influencing SMEs’ Adoption of Cloud Computing Services in Lebanon: An Empirical Analysis Using TOE and Contextual Theory," in IEEE Access, vol. 8, pp. 79169-79181, 2020.

    [4]          Z. Wen, J. Cała, P. Watson and A. Romanovsky, "Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds," in IEEE Transactions on Services Computing, vol. 10, no. 6, pp. 929-941, 1 Nov.-Dec. 2017.

    [5]          A. Rezgui, N. Davis, Z. Malik, B. Medjahed and H. S. Soliman, "CloudFinder: A System for Processing Big Data Workloads on Volunteered Federated Clouds," in IEEE Transactions on Big Data, vol. 6, no. 2, pp. 347-358, 1 June 2020.

    [6]          P. Jamshidi, A. Ahmad and C. Pahl, "Cloud Migration Research: A Systematic Review," in IEEE Transactions on Cloud Computing, vol. 1, no. 2, pp. 142-157, July-December 2013.

    [7]          S. Gupta and S. C. Misra, "Moderating Effect of Compliance, Network, and Security on the Critical Success Factors in the Implementation of Cloud ERP," in IEEE Transactions on Cloud Computing, vol. 4, no. 4, pp. 440-451, 1 Oct.-Dec. 2016.

    [8]          Z. Feng, D. K. W. Chiu, R. Peng, P. Gong, K. He and Y. Huang, "Facilitating Cloud Process Family Co-Evolution by Reusable Process Plug-in: An Open-source Prototype," in IEEE Transactions on Services Computing, vol. 10, no. 6, pp. 854-867, 1 Nov.-Dec. 2017.

    [9]          H. Cai, B. Xu, L. Jiang and A. V. Vasilakos, "IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges," in IEEE Internet of Things Journal, vol. 4, no. 1, pp. 75-87, Feb. 2017.

    [10]       S. Mubeen, S. A. Asadollah, A. V. Papadopoulos, M. Ashjaei, H. Pei-Breivold and M. Behnam, "Management of Service Level Agreements for Cloud Services in IoT: A Systematic Mapping Study," in IEEE Access, vol. 6, pp. 30184-30207, 2018.

    [11]       S. Sobati Moghadam and A. Fayoumi, "Toward Securing Cloud-Based Data Analytics: A Discussion on Current Solutions and Open Issues," in IEEE Access, vol. 7, pp. 45632-45650, 2019.

    [12]       A. Abbas and S. U. Khan, "A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds," in IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 4, pp. 1431-1441, July 2014.

    [13]       M. Ficco and F. Palmieri, "Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks," in IEEE Systems Journal, vol. 11, no. 2, pp. 460-470, June 2017.

    [14]       Q. N. Naveed, M. R. N. Mohamed Qureshi, A. Shaikh, A. O. Alsayed, S. Sanober and K. Mohiuddin, "Evaluating and Ranking Cloud-Based E-Learning Critical Success Factors (CSFs) Using Combinatorial Approach," in IEEE Access, vol. 7, pp. 157145-157157, 2019.

    [15]       E. Z. Milian, M. d. M. Spinola, R. F. Goncalves and A. L. Fleury, "Assessing Challenges, Obstacles and Benefits of Adopting Cloud Computing: Study of an Academic Control System," in IEEE Latin America Transactions, vol. 13, no. 7, pp. 2301-2307, July 2015.

    [16]       Y. A. M. Qasem, R. Abdullah, Y. Y. Jusoh, R. Atan and S. Asadi, "Cloud Computing Adoption in Higher Education Institutions: A Systematic Review," in IEEE Access, vol. 7, pp. 63722-63744, 2019.

    [17]       J. L. Rice, V. V. Phoha and P. Robinson, "Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds," in IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 963-972, June 2013.

    [18]       M. Berekmeri, D. Serrano, S. Bouchenak, N. Marchand and B. Robu, "Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems," in IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1004-1016, 1 Oct.-Dec. 2018.

    [19]       P. Hofmann and D. Woods, "Cloud Computing: The Limits of Public Clouds for Business Applications," in IEEE Internet Computing, vol. 14, no. 6, pp. 90-93, Nov.-Dec. 2010.

    [20]       J. N. Khasnabish, M. F. Mithani and S. Rao, "Tier-Centric Resource Allocation in Multi-Tier Cloud Systems," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 576-589, 1 July-Sept. 2017.

    [21]       E. Bauer, "Cloud Automation and Economic Efficiency," in IEEE Cloud Computing, vol. 5, no. 2, pp. 26-32, Mar./Apr. 2018.

    [22]       A. Samba, "Logical Data Models for Cloud Computing Architectures," in IT Professional, vol. 14, no. 1, pp. 19-26, Jan.-Feb. 2012.

    [23]       M. Skafi, M. M. Yunis and A. Zekri, "Factors Influencing SMEs’ Adoption of Cloud Computing Services in Lebanon: An Empirical Analysis Using TOE and Contextual Theory," in IEEE Access, vol. 8, pp. 79169-79181, 2020.

    [24]       L. Sangavarapu, S. Mishra, A. Williams and G. R. Gangadharan, "The Indian Banking Community Cloud," in IT Professional, vol. 16, no. 6, pp. 25-32, Nov.-Dec. 2014.

    [25]       A. M. Sebastian and J. J. Kizhakkethottam, "A review on cloud security threats and solutions," 2015 International Conference on Soft-Computing and Networks Security (ICSNS), Coimbatore, India, 2015, pp. 1-4.

    [26]       M. Ficco and F. Palmieri, "Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks," in IEEE Systems Journal, vol. 11, no. 2, pp. 460-470, June 2017.

    [27]       Ryoo, S. Rizvi, W. Aiken and J. Kissell, "Cloud Security Auditing: Challenges and Emerging Approaches," in IEEE Security & Privacy, vol. 12, no. 6, pp. 68-74, Nov.-Dec. 2014.

    [28]       J. Ryoo, S. Rizvi, W. Aiken and J. Kissell, "Cloud Security Auditing: Challenges and Emerging Approaches," in IEEE Security & Privacy, vol. 12, no. 6, pp. 68-74, Nov.-Dec. 2014.

    [29]       M. Irfan, M. Usman, Y. Zhuang and S. Fong, "A Critical Review of Security Threats in Cloud Computing," 2015 3rd International Symposium on Computational and Business Intelligence (ISCBI), Bali, Indonesia, 2015, pp. 105-111.

    Cite This Article As :
    Hamid, Nagham. , Mahdi, Nada. , Mohsen, Sanaa. The Impact of Cloud Computing on Network Security Risk for Organization Behaviours. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 270-276. DOI: https://doi.org/10.54216/JCIM.150121
    Hamid, N. Mahdi, N. Mohsen, S. (2025). The Impact of Cloud Computing on Network Security Risk for Organization Behaviours. Journal of Cybersecurity and Information Management, (), 270-276. DOI: https://doi.org/10.54216/JCIM.150121
    Hamid, Nagham. Mahdi, Nada. Mohsen, Sanaa. The Impact of Cloud Computing on Network Security Risk for Organization Behaviours. Journal of Cybersecurity and Information Management , no. (2025): 270-276. DOI: https://doi.org/10.54216/JCIM.150121
    Hamid, N. , Mahdi, N. , Mohsen, S. (2025) . The Impact of Cloud Computing on Network Security Risk for Organization Behaviours. Journal of Cybersecurity and Information Management , () , 270-276 . DOI: https://doi.org/10.54216/JCIM.150121
    Hamid N. , Mahdi N. , Mohsen S. [2025]. The Impact of Cloud Computing on Network Security Risk for Organization Behaviours. Journal of Cybersecurity and Information Management. (): 270-276. DOI: https://doi.org/10.54216/JCIM.150121
    Hamid, N. Mahdi, N. Mohsen, S. "The Impact of Cloud Computing on Network Security Risk for Organization Behaviours," Journal of Cybersecurity and Information Management, vol. , no. , pp. 270-276, 2025. DOI: https://doi.org/10.54216/JCIM.150121