📞 +91-7667918914 | ✉️ iarjset@gmail.com
International Advanced Research Journal in Science, Engineering and Technology
International Advanced Research Journal in Science, Engineering and Technology A Monthly Peer-Reviewed Multidisciplinary Journal
ISSN Online 2393-8021ISSN Print 2394-1588Since 2014
IARJSET aligns to the suggestive parameters by the latest University Grants Commission (UGC) for peer-reviewed journals, committed to promoting research excellence, ethical publishing practices, and a global scholarly impact.
← Back to VOLUME 12, ISSUE 8, AUGUST 2025

Modern Cloud Security Threats and Vulnerabilities: A Comprehensive Review

Bhavana B R, Shashank R, Druva H P

👁 2 views📥 0 downloads
Share: 𝕏 f in

Abstract: Cloud computing has revolutionized the provision of IT services via elastic models like Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). These models, though, come with an array of security threats that keep changing with technology. This review analyses and classifies widespread security attacks in the cloud service models-focusing on prevalent attacks like SQL injection in SaaS, unauthorized access in PaaS, and data breach in IaaS. It integrates current defence mechanisms, with a particular emphasis on machine learning methods and cryptographic mechanisms, and stresses the increasing importance of joint security efforts by cloud users and providers. Moreover, the paper summarizes actual cloud-based attack vectors in real life, categorizing them based on severity to facilitate risk prioritization. The assessment also discusses the specific challenges brought about by cloud integration into industrial SCADA systems, detailing their primary vulnerabilities and categorizing related threats into types such as hardware-level, protocol-based, and insider attacks. Lastly, it talks about changing trends and best practices and highlights the move from ad hoc security reactions to formal, risk-defined cloud security strategies.

Keywords: Cloud Security, Cloud Computing, Threats & Vulnerabilities (or "Cloud Threats"), Cloud Service Providers (CSPs), Cloud Deployment Models (SaaS, PaaS, IaaS), Zero Trust Architecture (ZTA)

How to Cite:

[1] Bhavana B R, Shashank R, Druva H P, “Modern Cloud Security Threats and Vulnerabilities: A Comprehensive Review,” International Advanced Research Journal in Science, Engineering and Technology (IARJSET), DOI: 10.17148/IARJSET.2025.12846

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.