Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

June 2020, Volume 7, 1, pp 12-19

Cloud Security Vulnerabilities and Solution Model

Shouket Ahmad Kouchay

Shouket Ahmad Kouchay 1

  1. Faculty, King Saud University, KSA. 1

on Google Scholar
on PubMed

Pages: 12-19

DOI: 10.18488/journal.76.2020.71.12.19

Share :

Article History:

Received: 28 October, 2019
Revised: 03 December, 2019
Accepted: 06 January, 2020
Published: 13 February, 2020


Cloud computing is the revolution and solution to the computing world which has paid further attention as an emerging network storage technology. Cloud computing has enormous adaptability in terms of demand or availability of resources. The organization prefers cloud storage services to reduce the overhead of storing data locally. Yet, Data security and privacy are the major issues in cloud computing. Although security is still one of the critical challenges in the world of cloud computing. The security concerns comprise the loss of vital information and privacy loss of any individual who uses cloud networking. This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES. According to our research, this model is one of the most compact encryption which consumes less storage space with short calculation time. A detailed review of cloud security concerns and resolutions has been discussed in this paper.
Contribution/ Originality
This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES.


Cloud security vulnerabilities, Advanced encryption standard, IAAS, SAAS, PAAS, Cloud computing security technique.


[1]          Cloud Vulnerabilities Working Group, "Cloud vulnerabilities research program." Retrieved: . [Accessed Dec 2019], 2016.

[2]          G. Calvary, Computer science and ambient intelligence, 1st ed. London: Iste, 2013.

[3]          Z. Fu, X. Sun, N. Linge, and L. Zhou, "Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query," IEEE Transactions on Consumer Electronics, vol. 60, pp. 164-172, 2014.Available at:

[4]          S. O. Kuyoro, F. Ibikunle, and O. Awodele, "Cloud computing security issues and challenges," International Journal of Computer Networks, vol. 3, pp. 247-255, 2011.

[5]          L. Allen, T. Heriyanto, and S. Ali, Kali linux - assuring security by penetration testing, 1st ed. Birmingham, UK: Packt Publication, 2014.

[6]          A. K. Shouket, "Secured architecture strategy for fighting against bots," Computer Science & Telecommunications, vol. 40, pp. 16-23, 2013.

[7]          B. M. Salih and H. A. Edreis, "Comparison between virtualization and cloud computing," International Journal of Science and Research, vol. 5, pp. 195-199, 2016.Available at:

[8]          S. Singh, Y. S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," Journal of Network and Computer Applications, vol. 75, pp. 200-222, 2016.

[9]          K. Kumar and P. Kaur, "Road traffic control system in cloud computing: A review," International Journal of Grid and Distributed Computing, vol. 8, pp. 201-206, 2015.Available at:

[10]        T. Erl, R. Puttini, and Z. Mahmood, Cloud computing: Concepts, technology & architecture: Pearson Education, 2013.

[11]        M. Loudini, S. Rezig, and Y. Salhi, "Incorporate intelligence into the differentiated services strategies of a Web server: An advanced feedback control approach," Journal of Internet Services and Applications, vol. 1, pp. 1-16, 2013.

[12]        S. Rajasekhar, E. Murali, and G. Nagalakshm, "Efficient architecture cloud computing confidentiality," International Journal of Research Studies in Computer Science and Engineering, vol. 3, pp. 12-16, 2016.

[13]        C. Esposito, A. Castiglione, B. Martini, and K. Choo, "Cloud manufacturing: Security, privacy, and forensic concerns," IEEE Cloud Computing, vol. 3, pp. 16-22, 2016.Available at:

[14]        N. Huansheng, Unit and ubiquitous internet of things: CRC Press, 2016.

[15]        S. Pearson and G. Yee, Privacy and security for cloud computing, 1st ed. London: Springer, 2013.

[16]        L. Zhang, "Software architecture evaluation," Journal of Software, vol. 19, pp. 1328-1339, 2008.Available at:

[17]        R. Samani, B. Honan, J. Reavis, and V. Jirasek, CSA guide to cloud computing, 1st ed. Waltham, MA: Syngress, 2015.

[18]        H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy Magazine, vol. 8, pp. 24-31, 2010.Available at:

[19]        S. Sherin, S., "Security and privacy issues of cloud computing; Solutions and secure framework," IOSR Journal of Computer Engineering, vol. 10, pp. 33-37, 2013.Available at:

[20]        A. Gouri, K. Karthik, G. Arpita, and G. Priya, "Review on security management in cloud computing," International Journal of Engineering and Computer Science, vol. 5, pp. 18897-18906, 2016.

[21]        Z. Tari, "Security and privacy in cloud computing," IEEE Cloud Computing, vol. 1, pp. 54-57, 2014.

[22]        M. ZekriyapanahGashti, "Scrutiny new framework in integrated distributed reliable systems," International Journal of Distributed and Parallel Systems, vol. 3, pp. 13-20, 2012.Available at:

[23]        R. Minni, K. Sultania, S. Mishra, and D. R. Vincent, "An algorithm to enhance security in RSA," presented at the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 2013.


Google Scholor ideas Microsoft Academic Search bing Google Scholor


This study received no specific financial support.

Competing Interests:

The author declares that there are no conflicts of interests regarding the publication of this paper.


Related Article

( 1 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 2 ) To Convalesce Task Scheduling in a Decentralized Cloud Computing Environment
( 3 ) Smart Campus: An Implementation of a Cloud-Based Mobile Learning Application
( 4 ) A Framework for Digital Forensic in Joint Heterogeneous Cloud Computing Environment
( 5 ) Cloud Security Vulnerabilities and Solution Model
( 6 ) Factors Influencing Cloud Computing Adoption-Compared Review and A 4-M Recommendation
( 7 ) Security Issues with Contactless Bank Cards
( 8 ) Big Data in Homeland Security
( 9 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 10 ) A Security Scheme for Protecting Agent Societies
( 11 ) Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
( 12 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 14 ) Detection of Crossed Walls Security Alarm System against Invasion
( 17 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 19 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 20 ) Computational Modeling of Multi-Purpose Amphibious Aircraft Be-103
( 21 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 22 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 23 ) Network Traffic Analysis Using Queuing Model and Regression Technique
( 24 ) A Review of Machine Learning Models for Software Cost Estimation
( 25 ) Exploration of Intellectual Software Systems and Development of Conceptual Model