Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.63180/jjic.thestap.2025.1.5
The main objective of this study is to conduct a comprehensive analysis of cyber risks in cloud computing, including classifying threats, vulnerabilities, impacts, and countermeasures. This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat. Additionally, this study aims to explore the main vulnerabilities in terms of infrastructure, service and platform in cloud computing. This study uses the content analysis technique to collect, analyze, and classify data in terms of types of threats, vulnerabilities, and countermeasures. The methodology comprises four primary stages: (1) identifying key components, (2) threat identification, (3) vulnerability identification, and (4) countermeasure identification. The results indicate that DoS attacks and account hijacking attacks were the most prevalent infrastructure vulnerabilities in cloud computing, each accounting for 14% and 10% of incidents. The results found that unpatched software and weak access controls were classified as the most critical threats in the service level in cloud computing, comprising 17% and 12% of incidents, respectively. The results also indicated that encryption methods, access controls mechanisms and firewall malware protection are the most significant and effective countermeasures for protecting the infrastructure, service and platform in cloud computing environment. The findings of this study provides valuable recommendations for academic research in classifying the different types of cyber threats and understanding the significant security controls against cyber-attacks in cloud computing.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.63180/jjic.thestap.2025.1.5
- https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdf
- OA Status
- hybrid
- Cited By
- 9
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4411568910
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4411568910Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.63180/jjic.thestap.2025.1.5Digital Object Identifier
- Title
-
Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud ComputingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
Santosh Reddy Addula, Sajedeh Norozpour, Mohammed A. AminList of authors in order
- Landing page
-
https://doi.org/10.63180/jjic.thestap.2025.1.5Publisher landing page
- PDF URL
-
https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdfDirect OA link when available
- Concepts
-
Cloud computing, Computer security, Computer science, Secure coding, Cloud computing security, Software security assurance, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
9Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 9Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4411568910 |
|---|---|
| doi | https://doi.org/10.63180/jjic.thestap.2025.1.5 |
| ids.doi | https://doi.org/10.63180/jjic.thestap.2025.1.5 |
| ids.openalex | https://openalex.org/W4411568910 |
| fwci | 86.97305923 |
| type | article |
| title | Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing |
| biblio.issue | 1 |
| biblio.volume | 2025 |
| biblio.last_page | 48 |
| biblio.first_page | 38 |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9785000085830688 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| topics[1].id | https://openalex.org/T10734 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9728000164031982 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Information and Cyber Security |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.951200008392334 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.682494580745697 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6665904521942139 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.5676140785217285 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C22680326 |
| concepts[3].level | 5 |
| concepts[3].score | 0.45779353380203247 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q7444867 |
| concepts[3].display_name | Secure coding |
| concepts[4].id | https://openalex.org/C184842701 |
| concepts[4].level | 3 |
| concepts[4].score | 0.2755129933357239 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q370563 |
| concepts[4].display_name | Cloud computing security |
| concepts[5].id | https://openalex.org/C62913178 |
| concepts[5].level | 4 |
| concepts[5].score | 0.07979446649551392 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q7554361 |
| concepts[5].display_name | Software security assurance |
| concepts[6].id | https://openalex.org/C111919701 |
| concepts[6].level | 1 |
| concepts[6].score | 0.0 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[6].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.682494580745697 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.6665904521942139 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.5676140785217285 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/secure-coding |
| keywords[3].score | 0.45779353380203247 |
| keywords[3].display_name | Secure coding |
| keywords[4].id | https://openalex.org/keywords/cloud-computing-security |
| keywords[4].score | 0.2755129933357239 |
| keywords[4].display_name | Cloud computing security |
| keywords[5].id | https://openalex.org/keywords/software-security-assurance |
| keywords[5].score | 0.07979446649551392 |
| keywords[5].display_name | Software security assurance |
| language | en |
| locations[0].id | doi:10.63180/jjic.thestap.2025.1.5 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S5407049533 |
| locations[0].source.issn | 3080-6828 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 3080-6828 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Jordanian Journal of Informatics and Computing |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Jordanian Journal of Informatics and Computing |
| locations[0].landing_page_url | https://doi.org/10.63180/jjic.thestap.2025.1.5 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5094046167 |
| authorships[0].author.orcid | https://orcid.org/0009-0000-3286-8224 |
| authorships[0].author.display_name | Santosh Reddy Addula |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Santosh Reddy Addula |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5013899609 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-3542-1932 |
| authorships[1].author.display_name | Sajedeh Norozpour |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Sajedeh Norozpour |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5046264812 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-5091-0641 |
| authorships[2].author.display_name | Mohammed A. Amin |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Mohammed Amin |
| authorships[2].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-06-24T00:00:00 |
| display_name | Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9785000085830688 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W4244478748, https://openalex.org/W3150465815, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W1631032283, https://openalex.org/W1643546019, https://openalex.org/W2167151567 |
| cited_by_count | 9 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 9 |
| locations_count | 1 |
| best_oa_location.id | doi:10.63180/jjic.thestap.2025.1.5 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S5407049533 |
| best_oa_location.source.issn | 3080-6828 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 3080-6828 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Jordanian Journal of Informatics and Computing |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Jordanian Journal of Informatics and Computing |
| best_oa_location.landing_page_url | https://doi.org/10.63180/jjic.thestap.2025.1.5 |
| primary_location.id | doi:10.63180/jjic.thestap.2025.1.5 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S5407049533 |
| primary_location.source.issn | 3080-6828 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 3080-6828 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Jordanian Journal of Informatics and Computing |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://thestap.blob.core.windows.net/jcsra/articles/published/171305909875.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Jordanian Journal of Informatics and Computing |
| primary_location.landing_page_url | https://doi.org/10.63180/jjic.thestap.2025.1.5 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 9 |
| abstract_inverted_index.as | 142 |
| abstract_inverted_index.in | 15, 51, 58, 74, 119, 147, 151, 189, 204, 220 |
| abstract_inverted_index.is | 6 |
| abstract_inverted_index.of | 3, 12, 40, 53, 76, 78, 128, 158, 195, 209 |
| abstract_inverted_index.to | 7, 28, 33, 46, 68 |
| abstract_inverted_index.(1) | 89 |
| abstract_inverted_index.(2) | 93 |
| abstract_inverted_index.(3) | 96 |
| abstract_inverted_index.(4) | 100 |
| abstract_inverted_index.10% | 127 |
| abstract_inverted_index.12% | 157 |
| abstract_inverted_index.14% | 125 |
| abstract_inverted_index.17% | 155 |
| abstract_inverted_index.DoS | 107 |
| abstract_inverted_index.The | 0, 83, 103, 130, 161, 193 |
| abstract_inverted_index.and | 23, 56, 71, 81, 99, 109, 126, 136, 156, 171, 179, 187, 212 |
| abstract_inverted_index.are | 175 |
| abstract_inverted_index.for | 37, 124, 182, 201 |
| abstract_inverted_index.key | 91 |
| abstract_inverted_index.the | 48, 64, 114, 143, 148, 176, 184, 206, 214 |
| abstract_inverted_index.This | 25, 61 |
| abstract_inverted_index.aims | 45 |
| abstract_inverted_index.also | 163 |
| abstract_inverted_index.data | 73 |
| abstract_inverted_index.each | 38, 122 |
| abstract_inverted_index.four | 86 |
| abstract_inverted_index.main | 1, 49 |
| abstract_inverted_index.most | 115, 144, 177 |
| abstract_inverted_index.that | 106, 133, 165 |
| abstract_inverted_index.this | 4, 43, 196 |
| abstract_inverted_index.type | 39 |
| abstract_inverted_index.uses | 63 |
| abstract_inverted_index.weak | 137 |
| abstract_inverted_index.were | 113, 140 |
| abstract_inverted_index.cloud | 16, 59, 120, 152, 190, 221 |
| abstract_inverted_index.cyber | 13, 35, 210 |
| abstract_inverted_index.found | 132 |
| abstract_inverted_index.helps | 27 |
| abstract_inverted_index.level | 150 |
| abstract_inverted_index.risks | 14, 36 |
| abstract_inverted_index.study | 5, 44, 62, 197 |
| abstract_inverted_index.terms | 52, 75 |
| abstract_inverted_index.types | 77, 208 |
| abstract_inverted_index.access | 138, 168 |
| abstract_inverted_index.threat | 94 |
| abstract_inverted_index.account | 110 |
| abstract_inverted_index.against | 218 |
| abstract_inverted_index.attacks | 108, 112 |
| abstract_inverted_index.conduct | 8 |
| abstract_inverted_index.content | 65 |
| abstract_inverted_index.explore | 47 |
| abstract_inverted_index.malware | 173 |
| abstract_inverted_index.primary | 87 |
| abstract_inverted_index.results | 104, 131, 162 |
| abstract_inverted_index.service | 55, 149, 186 |
| abstract_inverted_index.stages: | 88 |
| abstract_inverted_index.threat. | 41 |
| abstract_inverted_index.threats | 146, 211 |
| abstract_inverted_index.academic | 202 |
| abstract_inverted_index.analysis | 11, 66 |
| abstract_inverted_index.analyze, | 70 |
| abstract_inverted_index.classify | 72 |
| abstract_inverted_index.collect, | 69 |
| abstract_inverted_index.controls | 32, 139, 169, 217 |
| abstract_inverted_index.critical | 145 |
| abstract_inverted_index.findings | 194 |
| abstract_inverted_index.firewall | 172 |
| abstract_inverted_index.identify | 29 |
| abstract_inverted_index.impacts, | 22 |
| abstract_inverted_index.indicate | 105 |
| abstract_inverted_index.methods, | 167 |
| abstract_inverted_index.mitigate | 34 |
| abstract_inverted_index.platform | 57, 188 |
| abstract_inverted_index.provides | 198 |
| abstract_inverted_index.research | 203 |
| abstract_inverted_index.security | 31, 216 |
| abstract_inverted_index.software | 135 |
| abstract_inverted_index.suitable | 30 |
| abstract_inverted_index.threats, | 20, 79 |
| abstract_inverted_index.valuable | 199 |
| abstract_inverted_index.comprises | 85 |
| abstract_inverted_index.computing | 191 |
| abstract_inverted_index.different | 207 |
| abstract_inverted_index.effective | 180 |
| abstract_inverted_index.hijacking | 111 |
| abstract_inverted_index.including | 18 |
| abstract_inverted_index.indicated | 164 |
| abstract_inverted_index.objective | 2 |
| abstract_inverted_index.prevalent | 116 |
| abstract_inverted_index.technique | 67 |
| abstract_inverted_index.unpatched | 134 |
| abstract_inverted_index.accounting | 123 |
| abstract_inverted_index.classified | 141 |
| abstract_inverted_index.comprising | 154 |
| abstract_inverted_index.computing, | 17, 121, 153 |
| abstract_inverted_index.computing. | 60, 222 |
| abstract_inverted_index.encryption | 166 |
| abstract_inverted_index.incidents, | 159 |
| abstract_inverted_index.incidents. | 129 |
| abstract_inverted_index.mechanisms | 170 |
| abstract_inverted_index.protecting | 183 |
| abstract_inverted_index.protection | 174 |
| abstract_inverted_index.classifying | 19, 205 |
| abstract_inverted_index.components, | 92 |
| abstract_inverted_index.identifying | 90 |
| abstract_inverted_index.methodology | 84 |
| abstract_inverted_index.significant | 178, 215 |
| abstract_inverted_index.environment. | 192 |
| abstract_inverted_index.Additionally, | 42 |
| abstract_inverted_index.comprehensive | 10 |
| abstract_inverted_index.cyber-attacks | 219 |
| abstract_inverted_index.respectively. | 160 |
| abstract_inverted_index.understanding | 213 |
| abstract_inverted_index.vulnerability | 97 |
| abstract_inverted_index.classification | 26 |
| abstract_inverted_index.countermeasure | 101 |
| abstract_inverted_index.infrastructure | 117 |
| abstract_inverted_index.countermeasures | 181 |
| abstract_inverted_index.identification, | 95, 98 |
| abstract_inverted_index.identification. | 102 |
| abstract_inverted_index.infrastructure, | 54, 185 |
| abstract_inverted_index.recommendations | 200 |
| abstract_inverted_index.vulnerabilities | 50, 118 |
| abstract_inverted_index.countermeasures. | 24, 82 |
| abstract_inverted_index.vulnerabilities, | 21, 80 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 98 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.99799693 |
| citation_normalized_percentile.is_in_top_1_percent | True |
| citation_normalized_percentile.is_in_top_10_percent | True |