Department of Computer Science, Kisii University, Kisii, Kenya.
Received on 12 December 2022; revised on 24 January 2023; accepted on 26 January 2023
The adoption of cloud computing has continued to grow, owing to its broad network access, remote accessibility, scalability, on demand self-service, rapid elasticity and resource pooling. In this environment, numerous devices are deployed to access the cloud data and services. This potentially increases the attack services, more so in public clouds. As such, the biggest challenge is the secure data exchange over insecure open network channels. This issue has seen the development of numerous security solutions over the recent past. In this paper, a survey of these security schemes, techniques and methods is provided. The findings indicate that majority of these methods have vulnerabilities that expose users to many attacks. Additionally, some of these security solutions have extremely high complexities that make the cloud communications inefficient.
Algorithms; Authentication; Cloud computing; Security; Storage
Get Your e Certificate of Publication using below link
Preview Article PDF
Catherine Kanini. Cloud computing communication environment security and performance: Challenges and probable solutions. World Journal of Advanced Engineering Technology and Sciences, 2023, 08(01), 110-127. Article DOI: https://doi.org/10.30574/wjaets.2023.8.1.0024