Mitigation Strategies for Security Challenges and Attacks in Cloud Computing

Authors

  • Asmatullah Nashir Assistant Professor, Information Technology Computer Science Faculty, Badakhshan University, Badakhshan, Afghanistan Author https://orcid.org/0009-0001-2115-1217
  • Mohammadullah shirpoor Assistant Professor, Information Technology Computer Science Faculty, Badakhshan University, Badakhshan, Afghanistan Author

DOI:

https://doi.org/10.61806/parj.v9i30.33

Abstract

Abstract
Cloud computing, as one of the emerging technologies, has rapidly become a significant part of information systems and plays an important role in daily life and businesses. While this technology is recognized as an effective tool for delivering services, it faces various types of attacks and challenges. The purpose of this study to investigate the security challenges and types of attacks that cloud computing faces and propose mitigation strategies to address these issues. The research employed a qualitative method, focusing on analyzing previous studies and reports to identify the primary security vulnerabilities and attacks targeting cloud services. The paper identifies security challenges and attacks in cloud computing, proposing mitigation strategies such as encryption, multi-factor authentication, and regular audits to improve security and reliability in cloud environments.
Keywords: Cloud Computing, Deployment Models, Service Models, Security Challenges, Attacks, Mitigation Strategies

Downloads

Download data is not yet available.

Author Biographies

  • Asmatullah Nashir, Assistant Professor, Information Technology Computer Science Faculty, Badakhshan University, Badakhshan, Afghanistan

    Assistant Professor, Information Technology Computer Science Faculty, Badakhshan University, Badakhshan, Afghanistan

  • Mohammadullah shirpoor, Assistant Professor, Information Technology Computer Science Faculty, Badakhshan University, Badakhshan, Afghanistan

    Assistant Professor, Information Technology Computer Science Faculty, Badakhshan University, Badakhshan, Afghanistan

Downloads

Published

2025-01-01

How to Cite

Mitigation Strategies for Security Challenges and Attacks in Cloud Computing. (2025). Pamir Academic & Research Journal , 9(30), 207-225. https://doi.org/10.61806/parj.v9i30.33