Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment
Abstract
1. Introduction
- Comprehensive literature review of multi-cloud security: Comprehensive collection and synthesis of recent research on threats, defences, and operational concerns in multi-cloud environments.
- Taxonomy of attacks and defence families: Clear classification of threat classes and countermeasure categories.
- Comparative trade-off analysis: Evaluation of security techniques in terms of cost, latency, complexity, and deployment feasibility across providers.
- Identification of critical gaps, practical research agenda, and recommendations.
2. Background
2.1. Cloud Service Providers
2.2. The Evolution of Hybrid and Multi-Cloud
3. Navigating the Storm
3.1. Attacks
3.2. Financial Abuse and Infrastructure Weaponization in Multi-Cloud Environments
3.3. Emerging Threats and Vulnerabilities
4. Comparative Study
4.1. Literature Search Description and Selection
4.2. Search Scope
4.3. Search Keywords
4.4. Inclusion Basis
- Addressed multi-cloud architectures.
- Examined at least one of the core domains in this review, such as security, IAM, provenance, or orchestration.
- Provided conceptual, architectural, empirical, or technical contributions relevant to multi-cloud environments.
4.5. Exclusion Basis
- Works limited to single-cloud scenarios.
- Non-technical opinion articles or introductory cloud overviews.
- Duplicated content between preprints and published versions.
5. Security Challenges in Multi-Cloud
6. Solutions and Frameworks for Securing Multi-Cloud
6.1. Cryptographic Techniques for Multi-Cloud Security
6.2. AI Techniques for Multi-Cloud Security
6.3. ML Techniques for Multi-Cloud Security
6.4. Fuzzy-Logic Techniques for Multi-Cloud Security
6.5. IAM Approach for Multi-Cloud Security
6.6. Emerging Technologies
6.7. Enterprise-Grade Solutions
7. Research Gap
7.1. Heavy Reliance on Simulation Without Real-World Cloud Validation
7.2. Fragmented Security Controls and Absence of Federated Trust Models
7.3. Lack of Real-Time, Cross-Cloud Threat Intelligence and Response
7.4. Cost Optimization Strategies Ignore Dynamic Constraints and SLA Penalties
7.5. Lack of Explainability and NLP-Driven Automation in Multi-Cloud Threat Detection and Intelligence Integration
7.6. Lack of Robust Data Provenance and Lineage Across Multi-Cloud Environments
8. Conclusions
- Federated, privacy-preserving detection layers with threat sharing standardization
- XAI validation for ML models applied to security issues
- Cross-cloud provenance systems combining cryptographic commitments with immutable logging
- Multi-objective cost, compliance, availability and environmental impact optimization in orchestration.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| Abbreviation | Full Form |
| RBFNN | Radial Basis Function Neural Network |
| CNN | Convolutional Neural Network |
| LSTM | Long Short-Term Memory |
| CNN-LSTM | Convolutional Neural Network Long Short-Term Memory |
| DNN | Deep Neural Networks |
| MLP-BP | Multi-Layer Perceptron Backpropagation |
| MLP-PSO | Multi-Layer Perceptron Particle Swarm Optimization |
| MFE-ELM | Multi-Feature Extraction Extreme Learning Machine |
| I-GN | Integer-Grading Normalization |
| OBL-RIO | Opposition-Based Learning Rat Inspired Optimizer |
| 2D-ACNN | 2D-Array Convolutional Neural Network |
| IoT | Internet of Things |
| CAPEX | Capital Expenditure |
| OPEX | Operational Expenditure |
| SIEM | Security Information and Event Management |
References
- Viswanath, G.; Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intell. 2021, 14, 691–698. [Google Scholar] [CrossRef]
- Canalys. Cloud Market Share Q4 2018 and Full Year 2018. 2018. Available online: https://www.canalys.com/newsroom/cloud-market-share-q4-2018-and-full-year-2018 (accessed on 11 January 2019).
- Subashini, S.; Kavitha, V. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 2011, 34, 1–11. [Google Scholar] [CrossRef]
- AlZain, M.A.; Pardede, E.; Soh, B.; Thom, J.A. Cloud Computing Security: From Single to Multi-Clouds. In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), Maui, HI, USA, 4–7 January 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 5490–5499. [Google Scholar] [CrossRef]
- Ahmed, W. Trends and Challenges in Securing Cloud Computing Environments: An Overview of Current Techniques. Prem. J. Comput. Sci. 2024, 1, 100004. [Google Scholar] [CrossRef]
- Creasy, R.J. The Origin of the VM/370 Time-Sharing System. IBM J. Res. Dev. 1981, 25, 483–490. [Google Scholar] [CrossRef]
- Dee, R. Magnetic Tape for Data Storage: An Enduring Technology. Proc. IEEE 2008, 96, 1775–1785. [Google Scholar] [CrossRef]
- Berners-Lee, T.; Cailliau, R.; Groff, J.F.; Pollermann, B. World-Wide Web: The Information Universe. Internet Res. 2010, 20, 461–471. [Google Scholar] [CrossRef]
- Hertzfeld, A. Bill and Andy’s Excellent Adventure II. Wired Magazine. 1994. Available online: https://www.wired.com/1994/04/general-magic/ (accessed on 28 June 2025).
- Khajeh-Hosseini, A.; Sommerville, I.; Sriram, I. Research Challenges for Enterprise Cloud Computing. arXiv 2010, arXiv:1001.3257. [Google Scholar] [CrossRef]
- Choudhary, V. Software as a Service: Implications for Investment in Software Development. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS), Waikoloa, HI, USA, 3–6 January 2007; p. 209. [Google Scholar] [CrossRef]
- Khajeh-Hosseini, A.; Sommerville, I.; Sriram, I. Research Agenda in Cloud Technologies. arXiv 2010, arXiv:1001.3259. [Google Scholar] [CrossRef]
- Bugnion, E.; Devine, S.; Rosenblum, M.; Sugerman, J.; Wang, E.Y. Bringing Virtualization to the x86 Architecture with the Original VMware Workstation. ACM Trans. Comput. Syst. 2012, 30, 12:1–12:51. [Google Scholar] [CrossRef]
- Matana, T. Origin & History of ASP, SaaS, PaaS and Cloud Computing. Int. J. Sci. Res. Manag. 2024, 12, 1571–1607. [Google Scholar] [CrossRef]
- Randal, A. The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers. arXiv 2019, arXiv:1904.12226. [Google Scholar] [CrossRef]
- Buyya, R.; Calheiros, R.N.; Li, X. Autonomic Cloud Computing: Open Challenges and Architectural Elements. arXiv 2012, arXiv:1209.3356. [Google Scholar] [CrossRef]
- Yang, L.; Jaffe, S.; Holtz, D.; Suri, S.; Sinha, S.; Weston, J.; Joyce, C.; Shah, N.; Sherman, K.; Lee, C.J.; et al. How Work From Home Affects Collaboration: A Large-Scale Study of Information Workers in a Natural Experiment During COVID-19. arXiv 2020, arXiv:2007.15584. [Google Scholar] [CrossRef]
- López Flores, N.G.; Islind, A.S.; Óskarsdóttir, M. Effects of the COVID-19 Pandemic on Learning and Teaching: A Case Study from Higher Education. arXiv 2021, arXiv:2105.01432. [Google Scholar] [CrossRef]
- Cao, Y.; Li, S.; Liu, Y.; Yan, Z.; Dai, Y.; Yu, P.S.; Sun, L. A Comprehensive Survey of AI-Generated Content (AIGC): A History of Generative AI from GAN to ChatGPT. arXiv 2023, arXiv:2303.04226. [Google Scholar] [CrossRef]
- Mohamadi, S.; Mujtaba, G.; Le, N.; Doretto, G.; Adjeroh, D.A. ChatGPT in the Age of Generative AI and Large Language Models: A Concise Survey. arXiv 2023, arXiv:2307.04251. [Google Scholar] [CrossRef]
- Pérez-Martínez, J.; Díaz, J.; Berrocal, J.; López-Viana, R.; González-Prieto, A. Edge computing. Computing 2022, 104, 2711–2747. [Google Scholar] [CrossRef]
- Hasan, B.T.; Idrees, A.K. Edge Computing for IoT. arXiv 2024, arXiv:2402.13056. [Google Scholar] [CrossRef]
- Tuli, S.; Mirhakimi, F.; Pallewatta, S.; Casale, G.; Javadi, B.; Yan, F.; Buyya, R.; Jennings, N.R. AI-Augmented Edge and Fog Computing: Trends and Challenges. arXiv 2022, arXiv:2208.00761. [Google Scholar] [CrossRef]
- Alonso, J.; Orue-Echevarria, L.; Casola, V.; Torre, A.I.; Huarte, M.; Osaba, E.; Lobo, J.L. Understanding the challenges and novel architectural models of multi-cloud native applications—A systematic literature review. J. Cloud Comput. 2023, 12, 6. [Google Scholar] [CrossRef]
- Atieh, A.T. The next generation cloud technologies: A review on distributed cloud, fog and edge computing and their opportunities and challenges. Res. Berg Rev. Sci. Technol. 2021, 1, 1–15. [Google Scholar]
- Somani, U.; Kanika, L.; Manish, M. Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In Proceedings of the First International Conference on Parallel, Distributed and Grid Computing (PDGC ’10), Solan, India, 28–30 October 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 211–216. [Google Scholar] [CrossRef]
- Pachala, S.; Rupa, C.; Sumalatha, L. An improved security and privacy management system for data in multi-cloud environments using a hybrid approach. Evol. Intell. 2021, 14, 1117–1133. [Google Scholar] [CrossRef]
- Nandhini, M.; Madhavi, S. Provisioning of data security for file transformation on multi-cloud storage. Bonfring Int. J. Softw. Eng. Soft Comput. 2019, 9, 15–16. [Google Scholar]
- Miyachi, C. What is “Cloud”? It is time to update the NIST definition? IEEE Cloud Comput. 2018, 5, 6–11. [Google Scholar] [CrossRef]
- Talbi, J.; Haqiq, A. A cloud broker architecture for cloud service selection based on multi-criteria decision making and rough set theory. Int. J. Comput. Aided Eng. Technol. 2020, 13, 448–464. [Google Scholar] [CrossRef]
- Software Development Company USA. Simform. 2020. Available online: http://www.simform.com/ (accessed on 28 June 2025).
- Fu, Z.; Sun, X.; Liu, Q.; Zhou, L.; Shu, J. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans. Commun. 2015, 98, 190–200. [Google Scholar] [CrossRef]
- Junghanns, P.; Fabian, B.; Ermakova, T. Engineering of secure multi-cloud storage. Comput. Ind. 2016, 83, 108–120. [Google Scholar] [CrossRef]
- Agrawal, D.; Das, S.; Abbadi, A.E. Big data and cloud computing: Current state and future opportunities. In Proceedings of the 14th International Conference on Extending Database Technology (EDBT/ICDT ’11), Uppsala, Sweden, 21–24 March 2011; pp. 530–533. [Google Scholar] [CrossRef]
- Zardari, M.; Low, T.; Zakaria, M. Hybrid Multi-cloud Data Security (HMCDS) Model and Data Classification. In Proceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT ’13), Kuching, Malaysia, 23–24 December 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 166–171. [Google Scholar] [CrossRef]
- Gundu, S.R.; Panem, C.A.; Thimmapuram, A. Hybrid IT and Multi Cloud an Emerging Trend and Improved Performance in Cloud Computing. SN Comput. Sci. 2020, 1, 256. [Google Scholar] [CrossRef]
- Bello, S.A.; Oyedele, L.O.; Akinade, O.O.; Bilal, M.; Delgado, J.M.D.; Akanbi, L.A.; Ajayi, A.O.; Owolabi, H.A. Cloud computing in construction industry: Use cases, benefits and challenges. Autom. Constr. 2021, 122, 103441. [Google Scholar] [CrossRef]
- Goscinski, A.; Brock, M. Toward dynamic and attribute based publication, discovery and selection for cloud computing. Future Gener. Comput. Syst. 2010, 26, 947–970. [Google Scholar] [CrossRef]
- Pallis, G. Cloud computing: The new frontier of internet computing. IEEE Internet Comput. 2010, 14, 70–73. [Google Scholar] [CrossRef]
- Misra, S.C.; Mondal, A. Identification of a company’s suitability for the adoption of cloud computing and modelling its corresponding return on investment. Math. Comput. Model. 2011, 53, 504–521. [Google Scholar] [CrossRef]
- Armbrust, M.; Stoica, I.; Zaharia, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; et al. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
- Sharif, A.M. It’s written in the cloud: The hype and promise of cloud computing. J. Enterp. Inf. Manag. 2010, 23, 131–134. [Google Scholar] [CrossRef]
- Voorsluys, W.; Broberg, J.; Venugopal, S.; Buyya, R. Cost of virtual machine live migration in clouds: A performance evaluation. In Proceedings of the 1st International Conference on Cloud Computing, Beijing, China, 1–4 December 2009; pp. 245–265. [Google Scholar] [CrossRef]
- Sultan, N. Cloud computing for education: A new dawn? Int. J. Inf. Manag. 2010, 30, 109–116. [Google Scholar] [CrossRef]
- Banyal, R.K.; Jain, V.K.; Jain, P. Dynamic Trust Based Access Control Framework for Securing Multi-Cloud Environment. In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies (ICTCS ’14), Udaipur Rajasthan, India, 14–16 November 2014; pp. 1–8. [Google Scholar] [CrossRef]
- Takabi, D.; Joshi, J.; Ahn, G.J. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. In Proceedings of the International Computer Software and Applications Conference (COMPSACW ’10), Seoul, Republic of Korea, 19–23 July 2010; pp. 393–398. [Google Scholar] [CrossRef]
- Alliance, C.S. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Technical Report. 2011. Available online: https://www.researchgate.net/publication/356433278_Security_guidance_for_critical_areas_of_focus_in_cloud_computing_v30; also available: https://cloudsecurityalliance.org/artifacts/security-guidance-for-critical-areas-of-focus-in-cloud-computing-v3# (accessed on 20 November 2025).
- Abbadi, I.M. A framework for establishing trust in Cloud provenance. Int. J. Inf. Secur. 2013, 12, 111–128. [Google Scholar] [CrossRef]
- Sekar, J. Multi-cloud Strategies for Distributed AI Workflows and Application. J. Emerg. Technol. Innov. Res. 2023, 10, 600–610. [Google Scholar]
- NIST. The NIST Definition of Cloud Computing; Special Publication 800-145; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011. [Google Scholar]
- Buyya, R.; Yeo, C.S.; Venugopal, S.; Broberg, J.; Brandic, I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 2009, 25, 599–616. [Google Scholar] [CrossRef]
- Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Lee, G.; Patterson, D.A.; Rabkin, A.; Stoica, I.; et al. Above the Clouds: A Berkeley View of Cloud Computing; Technical Report UCB/EECS-2009-28; University of California: Berkeley, CA, USA, 2009. [Google Scholar]
- Marston, S.; Li, Z.; Bandyopadhyay, S.; Zhang, J.; Ghalsasi, A. Cloud computing—The business perspective. Decis. Support Syst. 2011, 51, 176–189. [Google Scholar] [CrossRef]
- Adabala, S.K. The Role of Cloud Computing in Driving Business Innovation. Int. J. Innov. Res. Creat. Technol. 2020, 6, 1–19. [Google Scholar]
- Zawoad, S.; Hasan, R. Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv 2013, arXiv:1302.6312. [Google Scholar] [CrossRef]
- Yeboah-Ofori, A.; Jafar, A.; Abisogun, T.; Hilton, I.; Oseni, W.; Musa, A. Data Security and Governance in Multi-Cloud Computing Environment. In Proceedings of the 11th International Conference on Future Internet of Things and Cloud (FiCloud ’24), Vienna, Austria, 19–21 August 2024; pp. 215–222. [Google Scholar] [CrossRef]
- Mishra, S.K.; Mishra, S.; Alsayat, A.; Jhanjhi, N.Z.; Humayun, M.; Sahoo, K.S.; Luhach, A.K. Energy-Aware Task Allocation for Multi-Cloud Networks. IEEE Access 2020, 8, 178825–178834. [Google Scholar] [CrossRef]
- Mavrogeorgi, N.; Gogouvitis, S.; Voulodimos, A.; Kiriazis, D.; Varvarigou, T.; Shulman-Peleg, A.; Kolodner, E.K. Dynamic Rule-Based SLA Management in Clouds. In Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD ’13), Santa Clara, CA, USA, 28 June–3 July 2013; pp. 964–965. [Google Scholar] [CrossRef]
- Lin, X.; Wang, Y.; Xie, Q.; Pedram, M. Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment. IEEE Trans. Serv. Comput. 2014, 8, 175–186. [Google Scholar] [CrossRef]
- Ferrer, A.J.; Pérez, D.G.; González, R.S. Multi-cloud Platform-as-a-service Model, Functionalities and Approaches. Procedia Comput. Sci. 2016, 97, 63–72. [Google Scholar] [CrossRef]
- Cachin, C.; Keidar, I.; Shraer, A. Trusting the cloud. SIGACT News 2009, 40, 81–86. [Google Scholar] [CrossRef]
- Alyas, T.; Alissa, K.; Alqahtani, M.; Faiz, T.; Alsaif, S.A.; Tabassum, N.; Naqvi, H.H. Multi-Cloud Integration Security Framework Using Honeypots. Mob. Inf. Syst. 2022, 2022, 2600712. [Google Scholar] [CrossRef]
- Gonzalez, A.E.; Arzuaga, E. HerdMonitor: Monitoring Live Migrating Containers in Cloud Environments. In Proceedings of the 2020 IEEE International Conference on Big Data (BigData ’20), Atlanta, GA, USA, 10–13 December 2020; pp. 2180–2189. [Google Scholar]
- James, W. AI-Powered Threat Detection in Hybrid and Multi-Cloud Environments: Overcoming Security Challenges. 2023. Available online: https://www.researchgate.net/publication/384935856_AI-Powered_Threat_Detection_in_Hybrid_and_Multi-Cloud_Environments_Overcoming_Security_Challenges (accessed on 20 November 2025).
- Heilig, L.; Lalla-Ruiz, E.; Voß, S. Modeling and solving cloud service purchasing in multi-cloud environments. Expert Syst. Appl. 2020, 147, 113165. [Google Scholar] [CrossRef]
- Hoffa, C.; Mehta, G.; Freeman, T.; Deelman, E.; Keahey, K.; Berriman, B.; Good, J. On the use of cloud computing for scientific workflows. In Proceedings of the Fourth IEEE International Conference on eScience (eScience ’08), Indianapolis, IN, USA, 7–12 December 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 640–645. [Google Scholar]
- Tuli, S.; Mahmud, R.; Tuli, S.; Buyya, R. Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control. Electronics 2021, 10, 1171. [Google Scholar] [CrossRef]
- Guan, S.; De Grande, R.E.; Boukerche, A. A Multi-Layered Scheme for Distributed Simulations on the Cloud Environment. IEEE Trans. Cloud Comput. 2019, 7, 5–18. [Google Scholar] [CrossRef]
- Muhil, M.; Krishna, U.H.; Kumar, R.K.; Anita, E.A.M. Securing Multi-cloud Using Secret Sharing Algorithm. Procedia Comput. Sci. 2015, 50, 421–426. [Google Scholar] [CrossRef]
- Zhou, L.; Zygmunt, H. Securing Ad Hoc Networks. IEEE Netw. 1999, 13, 24–30. [Google Scholar] [CrossRef]
- Kritikos, K.; Zeginis, C.; Iranzo, J.; Gonzalez, R.S.; Seybold, D.; Griesinger, F.; Domaschka, J. Multi-cloud provisioning of business processes. J. Cloud Comput. 2019, 8, 18. [Google Scholar] [CrossRef]
- Journal of Cloud Computing. 2020. Available online: https://journalofcloudcomputing.springeropen.com/ (accessed on 28 June 2025).
- Pochu, S.; Nersu, S.; Kathram, S. Multi-Cloud DevOps Strategies: A Framework for Agility and Cost Optimization. J. Artif. Intell. Gen. Sci. 2024, 7, 104–119. [Google Scholar] [CrossRef]
- Seth, D.; Nerella, H.; Najana, M.; Tabbassum, A. Navigating the Multi-Cloud Maze: Benefits, Challenges, and Future Trends. Int. J. Glob. Innov. Solut. (IJGIS) 2024. [Google Scholar] [CrossRef]
- Abu-Libdeh, H.; Princehouse, L.; Weatherspoon, H. RACS: A case for cloud storage diversity. In Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC ’10), Indianapolis, IN, USA, 10–11 June 2010; pp. 229–240. [Google Scholar] [CrossRef]
- Bessani, A.; Correia, M.; Quaresma, B.; André, F.; Sousa, P. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Trans. Storage 2013, 9, 1–33. [Google Scholar] [CrossRef]
- Bowers, K.D.; Juels, A.; Oprea, A. HAIL: A high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS ’09), Chicago, IL, USA, 9–13 November 2009; pp. 187–198. [Google Scholar] [CrossRef]
- Cachin, C.; Haas, R.; Vukolic, M. Dependable Storage in the Intercloud. Tech. Report 3783, IBM Research. 2010. Available online: https://www.researchgate.net/publication/288925333_Dependable_storage_in_the_Intercloud/citation/download (accessed on 16 July 2025).
- Megouache, L.; Zitouni, A.; Djoudi, M. Ensuring User Authentication and Data Integrity in Multi-Cloud Environment. Hum.-Centric Comput. Inf. Sci. 2020, 10, 15. [Google Scholar] [CrossRef]
- Reece, M.; Lander, T.E.; Stoffolano, M.; Sampson, A.; Dykstra, J.; Mittal, S.; Rastogi, N. Systemic Risk and Vulnerability Analysis of Multi-cloud Environments. arXiv 2023, arXiv:2306.01862. [Google Scholar] [CrossRef]
- Afolaranmi, S.O.; Ferrer, B.R.; Martinez Lastra, J.L. A Framework for Evaluating Security in Multi-Cloud Environments. In Proceedings of the 44th Annual Conference of the IEEE Industrial Electronics Society (IECON ’18), Washington, DC, USA, 21–23 October 2018; pp. 3059–3066. [Google Scholar] [CrossRef]
- Lander, T.E., Jr. Multi-Cloud Architecture Attacks Through Application Programming Interfaces. Master’s Thesis, Mississippi State University, Starkville, MS, USA, 2024. [Google Scholar]
- Sun, P.J. Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access 2019, 7, 147420–147452. [Google Scholar] [CrossRef]
- Gupta, L.; Salman, T.; Ghubaish, A.; Unal, D.; Al-Ali, A.K.; Jain, R. Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach. Appl. Soft Comput. 2022, 118, 108439. [Google Scholar] [CrossRef]
- Salman, T.; Bhamare, D.; Erbad, A.; Jain, R.; Samaka, M. Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments. In Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud ’17), New York, NY, USA, 26–28 June 2017; pp. 97–103. [Google Scholar] [CrossRef]
- Hayajneh, T.; Mohd, B.; Itradat, A. Performance and Information Security Evaluation with Firewalls. Int. J. Secur. Its Appl. 2013, 7, 335–372. [Google Scholar] [CrossRef]
- Binu, C.T.; Mohan Kumar, S. A Review on Security Issues in Multi Cloud Computing and Prevention by Security Measures. Int. J. Sci. Res. Publ. 2023, 13, 248–254. [Google Scholar] [CrossRef]
- Reece, M.; Rastogi, N.; Lander, T.; Dykstra, J.; Mittal, S.; Sampson, A. Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. In Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024), San Antonio, TX, USA, 15–17 May 2024; pp. 47–52. [Google Scholar] [CrossRef]
- Awodele, O.; Ogu, E.; Kuyoro, S.; Umezuruike, C. On the Evolution of Virtualization and Cloud Computing: A Review. J. Comput. Sci. Appl. 2014, 2, 40–43. [Google Scholar] [CrossRef]
- Kilari, N.; Sridaran, R. A Survey on Security Threats for Cloud Computing. Int. J. Eng. Res. Technol. (IJERT) 2021, 1. [Google Scholar]
- Torkura, K.A.; Sukmana, M.I.H.; Cheng, F.; Meinel, C. Continuous auditing and threat detection in multi-cloud infrastructure. Comput. Secur. 2021, 102, 102124. [Google Scholar] [CrossRef]
- Cloud Security Alliance (CSA). Top Threats to Cloud Computing: The Egregious 11; Technical Report; Cloud Security Alliance: Seattle, WA, USA, 2019. [Google Scholar]
- Trend Micro. Data on 123 Million US Households Exposed Due to Misconfigured AWS S3 Bucket. 2017. Available online: https://www.trendmicro.com/vinfo/au/security/news/virtualization-and-cloud/data-on-123-million-us-households-exposed-due-to-misconfigured-aws-s3-bucket (accessed on 16 July 2025).
- UpGuard. Data Leaks, Cyber Risk, and eStar. 2017. Available online: https://www.upguard.com/breaches/cloud-leak-alteryx (accessed on 20 November 2025).
- Kincaid, J. Google Privacy Blunder Shares Your Docs Without Permission. 2009. Available online: http://techcrunch.com/2009/03/07/huge-google-privacy-blunder-shares-your-docs-without-permission/ (accessed on 16 July 2025).
- Jensen, M.; Schwenk, J.; Gruschka, N.; Iacono, L.L. Security Prospects through Cloud Computing by Adopting Multiple Clouds. In Proceedings of the IEEE 4th International Conference on Cloud Computing (CLOUD), Washington, DC, USA, 4–9 July 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 565–572. [Google Scholar] [CrossRef]
- Ristenpart, T.; Tromer, E.; Shacham, H.; Savage, S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS ’09), Chicago, IL, USA, 9–13 November 2009; pp. 199–212. [Google Scholar] [CrossRef]
- Gruschka, N.; Iacono, L.L. Vulnerable Cloud: SOAP Message Security Validation Revisited. In Proceedings of the 2009 IEEE International Conference on Web Services (ICWS ’09), Los Angeles, CA, USA, 6–10 July 2009; pp. 625–631. [Google Scholar] [CrossRef]
- McIntosh, M.; Austel, P. XML Signature Element Wrapping Attacks and Countermeasures. In Proceedings of the 2005 Workshop on Secure Web Services (SWS ’05), Fairfax, VA, USA, 11 November 2005; pp. 20–27. [Google Scholar] [CrossRef]
- Ponemon, I. Cost of a Data Breach Report; Benchmark Research Sponsored by IBM Security Independently Conducted by Ponemon Institute LLC; 2019. Available online: https://insights.integrity360.com/hubfs/2019-cost-of-a-data-breach-report-04_03025203USEN.pdf (accessed on 20 November 2025).
- Mohammad, N. Enhancing Security and Privacy in Multi-Cloud Environments: A Comprehensive Study on Encryption Techniques and Access Control Mechanisms. Int. J. Comput. Eng. Technol. 2021, 12, 51–63. [Google Scholar]
- Caprolu, M.; Raponi, S.; Oligeri, G.; Di Pietro, R. Cryptomining Makes Noise: A Machine Learning Approach for Cryptojacking Detection. arXiv 2020, arXiv:1910.09272. [Google Scholar] [CrossRef]
- Jayasinghe, K.; Guhanathan, P. A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure. In Proceedings of the 2020 2nd International Conference on Cloud Computing and Internet of Things (CCIOT 2020), Singapore, 22–24 February 2020; pp. 100–107. [Google Scholar] [CrossRef]
- Tekiner, E.; Acar, A.; Uluagac, A.S.; Kirda, E.; Selcuk, A.A. SoK: Cryptojacking Malware. arXiv 2021, arXiv:2103.03851. [Google Scholar] [CrossRef]
- Somani, G.; Gaur, M.S.; Sanghi, D.; Conti, M.; Buyya, R. DDoS Attacks in Cloud Computing: Issues, Taxonomy and Future Directions. Comput. Commun. 2017, 107, 30–48. [Google Scholar] [CrossRef]
- Dorsett, M.; Mann, S.; Chowdhury, J.; Mahmood, A. A Comprehensive Review of Denial of Wallet Attacks in Serverless Architectures. arXiv 2025, arXiv:2508.19284. [Google Scholar] [CrossRef]
- Karami, M.; Gupta, L.; Shakarian, P.; Shakarian, J. Attribution of Economic Denial of Sustainability Attacks in Public Clouds. EAI Endorsed Trans. Secur. Saf. 2018, 4, e2. [Google Scholar] [CrossRef]
- Saeed, S.; Zainal, A.B.; Ghaleb, F.A.; Al-rimy, B.A.S. Enhancing Public Cloud Resilience: An Analytical Review of Detection and Mitigation Strategies Against Economic Denial of Sustainability Attacks. Discov. Internet Things 2025, 5, 79. [Google Scholar] [CrossRef]
- Somasundaram, A. Economic Denial of Sustainability (EDoS) Attack on Cloud—A Survey. ICTACT J. Commun. Technol. 2016, 7, 1402–1407. [Google Scholar] [CrossRef]
- Aldhyani, T.H.H.; Alkahtani, H. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors 2022, 22, 4685. [Google Scholar] [CrossRef]
- Frieß, J.; Gattermayer, T.; Gelernter, N.; Schulmann, H.; Waidner, M. Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. arXiv 2024, arXiv:2403.19368. [Google Scholar] [CrossRef]
- Pansy. 80+ Cloud Security Statistics to Know for 2024. 2024. Available online: https://sprinto.com/blog/cloud-security-statistics/ (accessed on 16 July 2025).
- IBM. Cost of a Data Breach 2024. 2024. Available online: https://www.ibm.com/reports/data-breach (accessed on 20 November 2025).
- Alouffi, B.; Hasnain, M.; Alharbi, A.; Alosaimi, W.; Alyami, H.; Ayaz, M. A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access 2021, 9, 57792–57807. [Google Scholar] [CrossRef]
- Jaeger, P.; Lin, J.; Grimes, J. Cloud Computing and Information Policy: Computing in a Policy Cloud? J. Inf. Technol. Politics 2008, 5, 269–283. [Google Scholar] [CrossRef]
- Sasubilli, M.K.; Venkateswarlu, R. Cloud Computing Security Challenges, Threats and Vulnerabilities. In Proceedings of the 6th International Conference on Inventive Computation Technologies (ICICT ’21), Coimbatore, India, 20–22 January 2021; pp. 476–480. [Google Scholar] [CrossRef]
- Tankard, C. What the GDPR Means for Businesses. Netw. Secur. 2016, 2016, 5–8. [Google Scholar] [CrossRef]
- European Union. General Data Protection Regulation (GDPR). 2020. Available online: https://eur-lex.europa.eu/eli/reg/2016/679/oj (accessed on 20 November 2025).
- Cloud Security Alliance (CSA). State of Cloud Report; Cloud Security Alliance: Seattle, WA, USA, 2018; Available online: https://cloudsecurityalliance.org/artifacts/state-of-cloud-report (accessed on 20 November 2025).
- NetDiligence. Cyber Claims Study 2020 Report. 2020. Available online: https://netdiligence.com/cyber-claims-study-2020-report/ (accessed on 20 November 2025).
- Ali, T.E.; Zoltan, A.D. Hierarchical Deep Learning for Robust Cybersecurity in Multi-Cloud Healthcare Infrastructures. Eng. Technol. Appl. Sci. Res. 2025, 15, 20358–20366. [Google Scholar] [CrossRef]
- Choi, S.J.; Johnson, M.E. Do Hospital Data Breaches Reduce Patient Care Quality? arXiv 2019. [Google Scholar] [CrossRef]
- Marelli, M. The SolarWinds Hack: Lessons for International Humanitarian Organizations. Int. Rev. Red Cross 2022, 104, 1267–1284. [Google Scholar] [CrossRef]
- Jones, J.; Smith, B.; Micheal, O.; Barnes, M.; Adebayo, H. Revolutionizing Cybersecurity with AI-Driven SIEM: Optimizing Threat Detection in Multi-Cloud Environments. 2025; unpublished manuscript. [Google Scholar]
- Velavan, A.S.; Sureshkumar, C. Double Fuzzy Clustering-Driven Context Neural Network for Intrusion Detection in Cloud Computing. Wirel. Netw. 2025, 31, 2513–2524. [Google Scholar] [CrossRef]
- Masoodi, H.J.K.A.L. Evaluating the Effectiveness of Machine Learning-Based Intrusion Detection in Multi-Cloud Environments. Babylon. J. Internet Things 2024, 2024, 94–105. [Google Scholar] [CrossRef]
- Mitropoulou, K.; Kokkinos, P.; Soumplis, P.; Varvarigos, E. Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms. J. Grid Comput. 2024, 22, 6. [Google Scholar] [CrossRef]
- Fatani, A.; Dahou, A.; Abd Elaziz, M.; Al-qaness, M.A.A.; Lu, S.; Alfadhli, S.A.; Alresheedi, S.S. Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks. Sensors 2023, 23, 4430. [Google Scholar] [CrossRef]
- Alzughaibi, S.; El Khediri, S. A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset. Appl. Sci. 2023, 13, 2276. [Google Scholar] [CrossRef]
- Attou, H.; Mohy-eddine, M.; Guezzaz, A.; Benkirane, S.; Azrour, M.; Alabdultif, A.; Almusallam, N. Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing. Appl. Sci. 2023, 13, 9588. [Google Scholar] [CrossRef]
- Bingu, R.; Jothilakshmi, S. Design of Intrusion Detection System using Ensemble Learning Technique in Cloud Computing Environment. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2023, 14, 751–764. [Google Scholar] [CrossRef]
- Lin, H.; Xue, Q.; Feng, J.; Bai, D. Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digit. Commun. Netw. 2023, 9, 111–124. [Google Scholar] [CrossRef]
- Nizamudeen, S. Intelligent intrusion detection framework for multi-clouds–IoT environment using swarm-based deep learning classifier. J. Cloud Comput. 2023, 12, 134. [Google Scholar] [CrossRef]
- Shahzad, F.; Mannan, A.; Javed, A.; Almadhor, A.S.; Baker, T.; Al-Jumeily OBE, D. Cloud-based multiclass anomaly detection and categorization using ensemble learning. J. Cloud Comput. 2022, 11, 74. [Google Scholar] [CrossRef]
- Samunnisa, K.; Kumar, G.S.V.; Madhavi, K. Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Meas. Sens. 2023, 25, 100612. [Google Scholar] [CrossRef]
- Abusitta, A.; Bellaiche, M.; Dagenais, M.; Halabi, T. A Deep Learning Approach for Proactive Multi-Cloud Cooperative Intrusion Detection System. Future Gener. Comput. Syst. 2019, 98, 308–318. [Google Scholar] [CrossRef]
- Achar, S. Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape. Int. J. Comput. Syst. Eng. 2022, 16, 379–384. [Google Scholar] [CrossRef]
- Deepa, T.; Kiran Mayee, M. Cloud Computing: Security and Privacy Issues. Int. J. Trend Res. Dev. (IJTRD) 2017. Available online: http://www.ijtrd.com/papers/IJTRD13397.pdf (accessed on 14 October 2025).
- Razaque, A.; Nadimpalli, S.S.V.; Vommina, S.; Atukuri, D.K.; Reddy, D.N.; Anne, P.; Vegi, D.; Malllapu, V.S. Secure Data Sharing in Multi-Clouds. In Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016; pp. 1909–1913. [Google Scholar] [CrossRef]
- Rodigari, S.; O’Shea, D.; McCarthy, P.; McCarry, M.; McSweeney, S. Performance Analysis of Zero-Trust Multi-Cloud. In Proceedings of the 14th IEEE International Conference on Cloud Computing (CLOUD ’21), Chicago, IL, USA, 5–10 September 2021; pp. 730–732. [Google Scholar] [CrossRef]
- Dickinson, M.; Debroy, S.; Calyam, P.; Valluripally, S.; Zhang, Y.; Antequera, R.B.; Joshi, T.; White, T.; Xu, D. Multi-Cloud Performance and Security Driven Federated Workflow Management. IEEE Trans. Cloud Comput. 2021, 9, 240–257. [Google Scholar] [CrossRef]
- Kurdi, H.; Alsalamah, S.; Alatawi, A.; Alfaraj, S.; Altoaimy, L.; Ahmed, S.H. HealthyBroker: A Trustworthy Blockchain-Based Multi-Cloud Broker for Patient-Centered eHealth Services. Electronics 2019, 8, 602. [Google Scholar] [CrossRef]
- Alaluna, M.; Vial, E.; Neves, N.; Ramos, F.M.V. Secure Multi-Cloud Network Virtualization. Comput. Netw. 2019, 161, 168–185. [Google Scholar] [CrossRef]
- Shirvani, M.H. Web Service Composition in Multi-Cloud Environment: A Bi-Objective Genetic Optimization Algorithm. In Proceedings of the 2018 Innovations in Intelligent Systems and Applications (INISTA ’18), Thessaloniki, Greece, 3–5 July 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Subramanian, K.; John, F.L. Enhanced Security for Data Sharing in Multi Cloud Storage (SDSMC). Int. J. Adv. Comput. Sci. Appl. 2017, 8, 176–185. [Google Scholar] [CrossRef]
- Sarojini, G.; Vijayakumar, V.A.; Selvamani, K. Trusted and Reputed Services Using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud. Procedia Comput. Sci. 2016, 92, 506–512. [Google Scholar] [CrossRef]
- Sulochana, M.; Dubey, O. Preserving Data Confidentiality Using Multi-cloud Architecture. Procedia Comput. Sci. 2015, 50, 357–362. [Google Scholar] [CrossRef]
- Fan, W.; Perros, H. A Novel Trust Management Framework for Multi-Cloud Environments Based on Trust Service Providers. Knowl.-Based Syst. 2014, 70, 392–406. [Google Scholar] [CrossRef]
- Kumar, N.S.; Lakshmi, G.V.R.; Balamurugan, B. Enhanced Attribute Based Encryption for Cloud Computing. Procedia Comput. Sci. 2015, 46, 689–696. [Google Scholar] [CrossRef]
- Alhamazani, K.; Ranjan, R.; Mitra, K.; Jayaraman, P.P.; Huang, Z.; Wang, L.; Rabhi, F. CLAMS: Cross-layer Multi-cloud Application Monitoring-as-a-Service Framework. In Proceedings of the 2014 IEEE International Conference on Services Computing (SCC ’14), Anchorage, AK, USA, 27 June–2 July 2014; pp. 283–290. [Google Scholar] [CrossRef]
- Giweli, N.; Shahrestani, S.; Cheung, H. Enhancing Data Privacy and Access Anonymity in Cloud Computing. Commun. IBIMA 2013, 2013, 1–10. [Google Scholar] [CrossRef]
- Dou, W.; Zhang, X.; Liu, J.; Chen, J. HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 455–466. [Google Scholar] [CrossRef]
- Tabalvandani, M.A.N.; Shirvani, M.H.; Motameni, H. Reliability-aware web service composition with cost minimization perspective: A multi-objective particle swarm optimization model in multi-cloud scenarios. Soft Comput. 2024, 28, 5173–5196. [Google Scholar] [CrossRef]
- Tang, X. Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems. IEEE Trans. Cloud Comput. 2022, 10, 2909–2919. [Google Scholar] [CrossRef]
- Wojtowicz, D.T.; Yin, S.; Morvan, F.; Hameurlain, A. Cost-Effective Dynamic Optimisation for Multi-Cloud Queries. In Proceedings of the 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA, 5–10 September 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 387–397. [Google Scholar] [CrossRef]
- Wang, P.; Zhao, C.; Liu, W.; Chen, Z.; Zhang, Z. Optimizing Data Placement for Cost Effective and High Available Multi-Cloud Storage. Comput. Inform. 2020, 39, 51–82. [Google Scholar] [CrossRef]
- Gao, T.; Wu, C.Q.; Hou, A.; Wang, Y.; Li, R.; Xu, M. Minimizing Financial Cost of Scientific Workflows under Deadline Constraints in Multi-Cloud Environments. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC ’19), Limassol, Cyprus, 8–12 April 2019; pp. 114–121. [Google Scholar] [CrossRef]
- Peralta, G.; Garrido, P.; Bilbao, J.; Agüero, R.; Crespo, P.M. On the Combination of Multi-Cloud and Network Coding for Cost-Efficient Storage in Industrial Applications. Sensors 2019, 19, 1673. [Google Scholar] [CrossRef] [PubMed]
- Wang, P.; Zhao, C.; Zhang, Z. An Ant Colony Algorithm-Based Approach for Cost-Effective Data Hosting with High Availability in Multi-Cloud Environments. In Proceedings of the 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), Zhuhai, China, 27–29 March 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Mohammadi, S.; Pedram, H.; PourKarimi, L. Integer Linear Programming-based Cost Optimization for Scheduling Scientific Workflows in Multi-cloud Environments. J. Supercomput. 2018, 74, 4717–4745. [Google Scholar] [CrossRef]
- Zhang, Q.; Li, S.; Li, Z.; Xing, Y.; Yang, Z.; Dai, Y. CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability. IEEE Trans. Cloud Comput. 2015, 3, 372–386. [Google Scholar] [CrossRef]
- Imai, S.; Patterson, S.; Varela, C.A. Cost-Efficient High-Performance Internet-Scale Data Analytics over Multi-Cloud Environments. In Proceedings of the 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Shenzhen, China, 4–7 May 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 793–796. [Google Scholar] [CrossRef]
- Lucas-Simarro, J.L.; Moreno-Vozmediano, R.; Montero, R.S.; Llorente, I.M. Cost optimization of virtual infrastructures in dynamic multi-cloud scenarios. Concurr. Comput. Pract. Exper. 2015, 27, 2260–2277. [Google Scholar] [CrossRef]
- Bellur, U.; Malani, A.; Narendra, N.C. Cost Optimization in Multi-site Multi-cloud Environments with Multiple Pricing Schemes. In Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing (CLOUD), Anchorage, AK, USA, 27 June–2 July 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 689–696. [Google Scholar] [CrossRef]
- Legillon, F.; Melab, N.; Renard, D.; Talbi, E.G. Cost Minimization of Service Deployment in a Multi-Cloud Environment. In Proceedings of the 2013 IEEE Congress on Evolutionary Computation (CEC), Cancun, Mexico, 20–23 June 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 2580–2587. [Google Scholar] [CrossRef]
- Singh, Y.; Kandah, F.; Zhang, W. A Secured Cost-Effective Multi-Cloud Storage in Cloud Computing. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, 10–15 April 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 619–624. [Google Scholar] [CrossRef]
- Simarro, J.L.L.; Moreno-Vozmediano, R.; Montero, R.S.; Llorente, I.M. Dynamic Placement of Virtual Machines for Cost Optimization in Multi-Cloud Environments. In Proceedings of the 2011 International Conference on High Performance Computing & Simulation (HPCSim), Istanbul, Turkey, 4–8 July 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–7. [Google Scholar] [CrossRef]
- Frincu, M.E.; Craciun, C. Multi-objective Meta-heuristics for Scheduling Applications with High Availability Requirements and Cost Constraints in Multi-Cloud Environments. In Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), Melbourne, VIC, Australia, 5–8 December 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 267–274. [Google Scholar] [CrossRef]
- Gholami, A.; Laure, E. Data Security and Privacy Protection Issues in Cloud Computing: A Survey. Int. J. Big Data Intell. (IJBDI) 2017, 4, 81–87. [Google Scholar]
- Casola, V.; Benedictis, A.D.; Rak, M.; Villano, U. Security-by-design in multi-cloud applications: An optimization approach. Inf. Sci. 2018, 462, 220–234. [Google Scholar] [CrossRef]
- Paul, A.L. Security Challenges and Solutions in Multi-Cloud Environments. 2024. Available online: https://www.researchgate.net/publication/381074289_Security_Challenges_and_Solutions_in_Multi-Cloud_Environments (accessed on 27 July 2025).
- Saini, G.; Kaur, N. A Survey of Various Encryption Techniques in Multi Cloud to Reduce Information Leakage. Int. J. Intell. Syst. Appl. Eng. (IJISAE) 2024, 12, 3262–3273. [Google Scholar]
- Tchernykh, A.; Babenko, M.; Kuchukov, V.; Miranda-López, V.; Rivera-Rodriguez, R.; Avetisyan, A.; Radchenko, G. Data Reliability and Redundancy Optimization of a Secure Multi-Cloud Storage Under Uncertainty of Errors and Falsifications. In Proceedings of the International Conference on Computational Science (ICCS), Amsterdam, The Netherlands, 3–5 June 2020. [Google Scholar] [CrossRef]
- Gadde, S.; Amutharaj, J.; Usha, S. A Hybrid Cryptography Technique for Cloud Data Security. Int. J. Eng. Trends Technol. (IJETT) 2022, 70, 258–267. [Google Scholar] [CrossRef]
- Thangavel, P.; Mary, P.S.A.; RameshKannan, M.; Deiwakumari, K. Enhancing Data Security in Multi-Cloud Settings with Homomorphic Encryption: Concepts, Uses, And Obstacles. Educ. Adm. Theory Pract. 2024, 30, 7347–7353. [Google Scholar]
- Shaffi, S.M.; Vengathattil, S.; Sidhick, J.N.; Vijayan, R. AI-Driven Security in Cloud Computing: Enhancing Threat Detection, Automated Response, and Cyber Resilience. J. Cybersecur. Artif. Intell. 2024, 6, 44–56. [Google Scholar] [CrossRef]
- Rasel, F.M.; Peter, B. AI-Driven Frameworks for Enhancing Cybersecurity in Multi-Cloud Environments. Int. J. Adv. Eng. Technol. Innov. 2025, 1, 24–32. [Google Scholar]
- Talati, D.V. Enhancing Multi-Cloud Security with Quantum-Resilient AI for Anomaly Detection. World J. Adv. Res. Rev. 2022, 13, 629–638. [Google Scholar] [CrossRef]
- Nagaraj, B.K. Challenges and Solutions for Integrating AI with Multi-Cloud Architectures. Int. J. Multidiscip. Innov. Res. Methodol. (IJMIRM) 2022, 1, 15–23. [Google Scholar]
- Miryala, N.K. Effective Multi Cloud Security Using AI Technologies. Int. J. Comput. Trends Technol. (IJCTT) 2024, 72, 143–149. [Google Scholar] [CrossRef]
- Nassif, A.B.; Talib, M.A.; Nasir, Q.; Albadani, H.; Dakalbab, F.M. Machine Learning for Cloud Security: A Systematic Review. IEEE Access 2021, 9, 20717–20735. [Google Scholar] [CrossRef]
- Qayyum, A.; Qadir, J.; Al-Fuqaha, A.; Imran, M.A.; Krichen, M. Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security. Front. Big Data 2020, 3, 587139. [Google Scholar] [CrossRef]
- Butt, U.A.; Afzal, S.; Asif, H.; Khalil, I.; Halim, Z. A Review of Machine Learning Algorithms for Cloud Computing Security. Electronics 2020, 9, 1379. [Google Scholar] [CrossRef]
- Mamidi, S.R. Securing Multi-Cloud Architectures: A Machine Learning Perspective. J. Artif. Intell. Gen. Sci. (JAIGS) 2024, 2, 233–247. [Google Scholar] [CrossRef]
- Ahmed, Q.O. Machine Learning for Intrusion Detection in Cloud Environments: A Comparative Study. J. Artif. Intell. Gen. Sci. (JAIGS) 2024, 6, 551–561. [Google Scholar] [CrossRef]
- Hagshenas, N.; Mojarad, M.; Arfaeinia, H. A Fuzzy Approach to Fault Tolerant in Cloud using the Checkpoint Migration Technique. Int. J. Adv. Res. Comput. Sci. 2017, 8, 230–236. [Google Scholar] [CrossRef]
- Swamy, S.R.; Mandapati, S. A Fuzzy Energy and Security Aware Scheduling in Cloud. Int. J. Comput. Sci. Eng. 2018, 6, 168–173. [Google Scholar]
- Soleymani, M.; Abapour, N.; Taghizadeh, E.; Siadat, S.; Karkehabadi, R. Fuzzy Rule-Based Trust Management Model for the Security of Cloud Computing. Math. Probl. Eng. 2021, 2021, 1–15. [Google Scholar] [CrossRef]
- Sharmila, L.; Sakthi, U. Cloud Security Risk Analysis Method based on Fuzzy Logic. Int. J. Recent Technol. Eng. (IJRTE) 2019, 8, 6152–6156. [Google Scholar] [CrossRef]
- Tariq, M.I.; Tayyaba, S.; Mian, N.A.; Sarfraz, M.S.; Hussain, A.; Imran, M.; Pricop, E.; Cangea, O.; Paraschiv, N. An Analysis of the Application of Fuzzy Logic in Cloud Computing. J. Intell. Fuzzy Syst. 2021, 41, 3629–3640. [Google Scholar] [CrossRef]
- Chopra, P.; Bedi, R.P.S. Applications of Fuzzy Logic in Cloud Computing: A Review. Int. J. Sci. Res. Eng. Technol. (IJSRET) 2017, 6, 868–873. [Google Scholar]
- Mateen, M.; Nasrullah, N.; Hayat, S.; Tehreem, T.; Akbar, M.A. A Self-Adaptive Resource Provisioning Approach using Fuzzy Logic for Cloud-Based Applications. Int. J. Comput. Digit. Syst. 2020, 9, 341–348. [Google Scholar] [CrossRef]
- Parkinson, S.; Khana, S. Identifying High-Risk Over-Entitlement in Access Control Policies Using Fuzzy Logic. Cybersecurity 2022, 5, 6. [Google Scholar] [CrossRef]
- Alqahtani, S. Cloud Intrusion Detection Systems: Fuzzy Logic and Classifications. Ph.D. Dissertation, University of Nottingham, Nottingham, UK, 2021. [Google Scholar]
- Hersyah, M.H.; Hossain, M.D.; Taenaka, Y.; Kadobayashi, Y. Fuzzyfortify: A Multi-Attribute Risk Assessment for Multi-Factor Authentication and Cloud Container Orchestration. Front. Comput. Sci. 2025, 7, 1557918. [Google Scholar] [CrossRef]
- Ike, J.E.; Kessie, J.D.; Okaro, H.E.; Ezeife, E.; Onibokun, T. Identity and Access Management in Cloud Storage: A Comprehensive Guide. Int. J. Multidiscip. Res. Growth Eval. 2025, 6, 245–252. [Google Scholar] [CrossRef]
- Cuzzocrea, A.; Belmerabet, I. Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID. In Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT), Dijon, France, 8–10 July 2024; pp. 649–654. [Google Scholar] [CrossRef]
- Barker, N.; Hughes, O.; Warren, R.; James, A. Identity and Access Management (IAM) for Microservices in Multi-Cloud. 2024. Available online: https://www.researchgate.net/publication/392163648 (accessed on 20 November 2025).
- Khambam, S.K.R.; Kaluvakuri, V.P.K. Multi-Cloud IAM Strategies for Fleet Management: Ensuring Data Security Across Platforms. J. Adv. Res. Cloud Comput. 2023, 7, 36–48. [Google Scholar] [CrossRef]
- Sivaraman, H. Zero Trust Identity and Access Management (IAM) in Multi-Cloud Environments. ESP J. Eng. Technol. Adv. 2023, 3, 135–139. [Google Scholar] [CrossRef]
- Akuthota, A.K. Securing Multi-Cloud Environments with SAP BTP, AI, and IAM: A Comprehensive Approach. Int. J. Sci. Technol. (IJSAT) 2025, 16, 14–28. [Google Scholar] [CrossRef]
- Peter, H. Emerging Threats and Best Practices in Cloud Security: Protecting Data in Multi-Cloud Environments. University of Belgrade. 2024. Available online: https://www.researchgate.net/publication/392195015_Emerging_Threats_and_Best_Practices_in_Cloud_Security_Protecting_Data_in_Multi-Cloud_Environments (accessed on 20 November 2025).
- Aditya, W.F.P.; Sukmaaji, A. Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation: A Focus on Security and Data Management. Inf. Technol. Int. J. 2024, 2, 64–69. [Google Scholar] [CrossRef]
- Karthick, R. A Comprehensive Survey on AI-Enabled Cloud Security, DevSecOps, and Scalable Digital Infrastructure. Preprints 2025. [Google Scholar] [CrossRef]
- Blika, A.; Palmos, S.; Doukas, G.; Lamprou, V.; Pelekis, S.; Kontoulis, M.; Ntanos, C.; Askounis, D. Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G Networks: A Comprehensive Survey. IEEE Open J. Commun. Soc. 2024, 5, 2456–2487. [Google Scholar] [CrossRef]
- Brezočnik, L.; Fister, I.; Podgorelec, V. Swarm Intelligence Algorithms for Feature Selection. Appl. Sci. 2018, 8, 1521. [Google Scholar] [CrossRef]
- Varzaneh, Z.A.; Hosseini, S. An Improved Equilibrium Optimization Algorithm for Feature Selection Problem in Network Intrusion Detection. Sci. Rep. 2024, 14, 18696. [Google Scholar] [CrossRef]
- Saheed, Y.K.; Usman, A.A.; Sukat, F.D.; Abdulrahman, M. A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the Internet of Things network. Front. Comput. Sci. 2023, 5, 997159. [Google Scholar] [CrossRef]
- Zhang, Z.; Hamadi, H.A.; Damiani, E.; Yeun, C.Y.; Taher, F. Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. Procedia Comput. Sci. 2023, 224, 858–865. [Google Scholar] [CrossRef]
- Tunde, O. Multi-Cloud Collaborative Training for Large-Scale Language Models: Techniques, Challenges, and Privacy Considerations. Int. J. Multidiscip. Res. Growth Eval. 2025, 6, 517–522. [Google Scholar] [CrossRef]
- Jimmy, F.N.U. Cloud Security Posture Management: Tools and Techniques. J. Knowl. Learn. Sci. Technol. 2023, 2, 622. [Google Scholar] [CrossRef]
- Palo Alto Networks. Prisma Cloud: Comprehensive CSPM and CNAPP Platform. 2024. Available online: https://www.paloaltonetworks.com/prisma/cloud (accessed on 6 November 2025).
- Microsoft Corporation. Microsoft Defender for Cloud Documentation. Microsoft Learn. 2025. Available online: https://learn.microsoft.com/en-us/azure/defender-for-cloud/ (accessed on 20 November 2025).
- Petty, C. 2025 Gartner CNAPP Market Guide: Runtime Visibility is No Longer Optional. Sysdig Blog. 2025. Available online: https://www.sysdig.com/blog/2025-gartner-cnapp-market-guide/ (accessed on 20 November 2025).




| Cloud Provider | Cloud Service | Service Model | Service Function |
|---|---|---|---|
| Amazon | EC2 | IaaS | Server |
| Amazon | S3 | IaaS | Storage |
| GAE | PaaS | Development Environment | |
| Microsoft Corp | Windows Azure | IaaS | Storage |
| Microsoft Corp | Office 365 | SaaS | Office Suite |
| Salesforce | Salesforce Service Cloud | SaaS | Customer Relationship Management |
| CDC Software (APTEAN) | Pivotal CRM | SaaS | Business Customer Relationship (Built on Amazon Service) |
| eBid Systems | ProcureWare | SaaS | Procurement System |
| Procore | Procore Construction Project Management Software | SaaS | Project Management System |
| e-Builder | e-Builder | SaaS | Construction Management Software |
| Oracle | Aconex | SaaS | Project Management System |
| Amazon | AWS EMR | SaaS | Hadoop Framework |
| Deployment Model | Description | Advantages | Disadvantage | Challenges |
|---|---|---|---|---|
| Single-Cloud | A computing environment where all applications, IT resources, and services are hosted and managed by one cloud provider. | Offers simplified management and cost efficiency by delivering consistent performance through a unified provider ecosystem. | Increases the risk of vendor lock-in and service disruptions while limiting flexibility and provider choice. | Such as vendor lock-in, limited flexibility, and susceptibility to provider outages. |
| Multi-Cloud | An approach that leverages multiple cloud providers to host various IT resources, optimizing flexibility, performance, and resilience. | Enhanced flexibility and resilience while providing access to best-of-breed services and avoiding vendor lock-in. | Increases complexity in management, security, and cost optimization due to diverse architectures across providers. | Complex management, integration, security, governance, and cost optimization issues. |
| Hybrid Cloud | Integrates on-premises, public, and private cloud environments to enhance flexibility and scalability. | Delivers flexibility, scalability, and enhanced security by balancing workloads across on-premises, public, and private clouds. | Costly and complex to manage due to integration challenges and the need to maintain both private and public infrastructures. | Complex integration and management, data sovereignty and security concerns, and higher costs of operating dual infrastructures. |
| Types of Attack | Description |
|---|---|
| Data Leakage | Unauthorized exposure of sensitive data due to weak access controls, improper data classification, or accidental misconfigurations. |
| Insider Threat | Security risk originating from within the organization, such as administrators or employees misusing privileged access to compromise systems. |
| Integrity Issues | Alteration or corruption of data during transmission or storage, which may result in loss of trust, inaccurate analytics, or faulty application behaviour. |
| API Hacking | Cloud API hacking refers to the unauthorized leveraging of API vulnerabilities to steal data, escalate privileges, disrupt services, or completely compromise cloud infrastructure. |
| System Vulnerabilities | System vulnerabilities are defined as a flaw in the system’s design, implementation, configuration, or functionality that attackers may use to get unauthorized access, interfere with services, steal or modify sensitive confidential, or breach cloud resource security. |
| Flooding Attack | A flooding attack is a type of denial-of-service (DoS) attack where an attacker overloads cloud services by over-consuming resources such as bandwidth, processing power, leading to services being overwhelmed with traffic. |
| XML Signature Attack | An XML Signature Wrapping attack performs elements wrapping, duplication, or relocation in a signed XML structure in such a way that retains the original signature while altering the intended meaning of the message. |
| Denial of Service attacks | A Denial of Service (DoS) attack saturates the system with an overload of requests, preventing authentic users from accessing and causing system unavailability, sluggishness, or crashes within the cloud environment. |
| Malicious Attacks | Malicious attacks in cloud leverage malware injection, stealing credentials, insider collusion, or hypervisor exploits to gain unauthorized access, data theft, or service disruption, which compromises confidentiality, integrity, and availability. |
| MITM Attack | Man-in-the-Middle (MITM) attack in cloud invisibly intercepts and even alters the communications between parties, which may lead to data theft, data alteration, or unauthorized access. |
| Ref. | Year | Types of Detection | Detection Mechanism | Tool/Framework Used | Environment | Dataset | Data Classification |
|---|---|---|---|---|---|---|---|
| [124] | 2025 | Threat Detection | AI-Driven SIEM | N/A | Multi-Cloud | N/A | ✓ |
| [121] | 2025 | Anomaly Detection | SSAE with CHDLCY | Combined Hybrid Deep Learning Framework | Multi-Cloud | ✓ (BOT-IoT, NSL-KDD) | ✓ |
| [125] | 2024 | Intrusion Detection | DFCCNN-BWOA-IDC | MATLAB | N/A | ✓ (DARPA) | ✓ |
| [126] | 2024 | Intrusion Detection | 1D-CNN-based IDS | N/A | Multi-Cloud | ✓ (UNSW-NB15) | ✓ |
| [127] | 2024 | Anomaly Detection | Cluster-Based Local Outlier Factor (CBLOF), GraphSAGE | NetworkX, Neo4j | N/A | N/A | ✓ |
| [91] | 2023 | Threat Detection | CSBAuditor | N/A | Multi-Cloud | N/A | ✓ |
| [128] | 2023 | Intrusion Detection | Hybrid Deep Learning and optimization techniques | N/A | N/A | ✓ (KDDCup-99, NSL-KDD, BoT-IoT, CICIDS-2017) | ✓ |
| [129] | 2023 | Intrusion Detection | DNN, MLP-BP, MLP-PSO | N/A | N/A | ✓ (CSE-CIC-IDS2018) | ✓ |
| [130] | 2023 | Intrusion Detection | Random Forest (RF), RBFNN | N/A | N/A | ✓ (Bot-IoT, NSL-KDD) | ✓ |
| [131] | 2023 | Intrusion Detection | Hybrid Deep Learning techniques | N/A | N/A | ✓ (CICIDS 2018, SDN) | ✓ |
| [132] | 2023 | Intrusion Detection | MFE-ELM algorithm | N/A | N/A | ✓ (NSL-KDD) | ✓ |
| [133] | 2023 | Intrusion Detection | I-GN, OBL-RIO, 2D-ACNN | N/A | Multi-Cloud | ✓ (NF-UQ-NIDS) | ✓ |
| [84] | 2022 | Anomaly Detection | MUSE | TensorFlow, Keras | Multi-Cloud | ✓ (BOT-IoT, UNSW-NB15) | ✓ |
| [62] | 2022 | Intrusion Detection | Honeypots | Snort | Multi-Cloud | ✓ (KDD12) | ✓ |
| [134] | 2022 | Anomaly Detection | Ensemble Machine Learning (EML), CNN-LSTM | N/A | N/A | ✓ (UNSW-NB15) | ✓ |
| [135] | 2022 | Intrusion Detection | Hybrid Machine Learning techniques | N/A | N/A | ✓ (NSL-KDD, KDDCup99) | ✓ |
| [136] | 2019 | Intrusion Detection | Stacked Denoising Autoencoder-based IDS (SDAE-IDS) | GPU-enabled TensorFlow | Multi-Cloud | ✓ | ✓ |
| [85] | 2017 | Anomaly Detection | Supervised ML (Random Forest, Linear Regression) | N/A | Multi-Cloud | ✓ (UNSW) | ✓ |
| Threats to Confidentiality | |
|---|---|
| Insider User Threats | The risk is escalated as internal users, such as administrators, developers, and consultants across SaaS, PaaS, and IaaS models, can access the customer data. |
| External Attacker Threats | When possessing sensitive or valuable data, all cloud models are vulnerable to external attacks, such as social engineering, supply chain attacks, and even hardware manipulation. |
| Data Leakage | Data breaches between organizations sharing the same cloud service provider might occur due to human error or defective machinery. |
| Threats to Integrity | |
| Data Segregation | Data integrity may be compromised through improper segregation in shared environments, including SaaS services. |
| User Access | Inadequate controls over access, especially involving former employees, can lead to intentional data damage. |
| Data Quality | Data integrity can be affected for other users sharing the same infrastructure due to a misconfiguration or fault in the components by a single user. |
| Threats to Availability | |
| Change Management | Poorly managed changes by providers can disrupt service availability. |
| Denial of Service | DoS attacks, both internal and external, can affect any cloud model. |
| Physical Disruption | Less secure user environments are more vulnerable to physical disruptions. |
| Weak Recovery Procedures | Inadequate or untested disaster recovery plans can lead to prolonged outages. |
| Ref. | Year | Objective of Research | Security/Privacy Mechanism | Data Integrity | Strength | Limitation |
|---|---|---|---|---|---|---|
| [56] | 2024 | Data Security and Governance | N/A | ✓ | Governance & security integration, Multi-tool comparison. Accuracy: Not reported in the original study | Limited to experimental/simulated attacks, No quantifiable evaluation, No long-term deployment |
| [1] | 2023 | Secure big data using hybrid encryption | Feistel network and AES with S-box | ✓ | Complete security framework, Strong comparative performance. Accuracy: Not reported in the original study | No integrity verification, Limited scalability tested, Access control not explored |
| [140] | 2021 | Enhance Trust | Zero Trust Security Model(Istio) | ✗ | Novel cross-cloud setup, Multi-metric monitoring. Accuracy: Not reported in the original study | Limited test scenarios, Hardware imbalance |
| [27] | 2021 | Enhance security and privacy | DepSky Model, BFT, Shamir Secret Sharing | ✓ | QoS-aware authentication, Real multi-metric benchmarking. Accuracy (as reported): 29.19% (dataset not described) | Simulation-Only Evaluation, Limited Scope |
| [141] | 2021 | Enhance performance and security for resource allocation | Portunes Algebra, OnTimeURB, SRAA | ✓ | Joint performance/security optimization, Validated OnTimeURB framework. Accuracy: Not reported in the original study | Approximate Optimization, Limited Evaluation |
| [79] | 2020 | Improve authentication and data integrity | RSA Encryption, Hashing Algorithm | ✓ | Integrated triple-layer defence, Real-world deployment feasibility. Accuracy (as reported): 90–92% (dataset not described) | Simulation-Only, Scalability Untested, Heavy RSA Dependency |
| [142] | 2019 | Builds and tracks trust | Blockchain | ✓ | Dual trust evaluation (direct + indirect), Blockchain audit. Accuracy (as reported): 85–90% (dataset not described) | Simulated Evaluation, Performance Overhead |
| [143] | 2019 | Sirius system implementation | Secure embedding, Isolation | ✗ | First secure, open-source network virtualization platform. Accuracy: Not reported in the original study | Network control dependency, Nested VM impact |
| [144] | 2018 | Minimize cost | Bi-objective genetic optimization | ✗ | Advanced Mean Failure Cost, Sustainable decision-making. Accuracy: Not reported in the original study | Ignored inter-cloud costs, Static risk estimation |
| [145] | 2017 | Enhanced Security for data sharing | Data Slicing, Encryption | ✗ | No third-party trust dependency, Resistance to insider attacks. Accuracy (as reported): ~90% (dataset not described) | Key management issues, Fixed provider count |
| [33] | 2016 | Secure gateway system | Hybrid Secret Sharing | ✓ | Multi-layer cryptographic design, Resistance to insider attacks. Accuracy: Not reported in the original study | Trust Assumptions, Limited Scalability |
| [146] | 2016 | Increase Trust | Enhanced Mutual Trusted Access Control Algorithm, Behaviour-based Trust Model | ✗ | Evaluates user and provider trust, Ensures malicious access prevention. Accuracy: Not reported in the original study | Simulation-only, Uncertainty |
| [69] | 2015 | Increase Data Security | Shamir’s Secret Sharing | ✓ | Confidentiality, Integrity, Availability (CIA) through data splitting. Accuracy: Not reported in the original study | No validation or performance evaluation |
| [147] | 2015 | Enhance confidentiality and integrity | Auth, Encryption, Segmentation | ✗ | Integrity & confidentiality in one model, High reliability and reduced leakage. Accuracy: Not reported in the original study | No evaluation, Admin trust assumed |
| [148] | 2015 | Increase Trust | Trust Propagation Network | ✗ | Dual-layer trust model, Robust propagation network. Accuracy (as reported): 90% (dataset not described) | Simulation-only, No real integrity/privacy |
| [149] | 2015 | Increase Data Privacy | Asymmetric & Ciphertext-Policy Attribute-Based Encryption, Hash functions, Digital signatures | ✓ | Fine-grained access control, Dual authentication, Data verification. Accuracy: Not reported in the original study | Computational Overhead, Lack of Implementation & Performance Evaluation |
| [45] | 2014 | Increase Trust | Dynamic Trust-Based Access Control (DTBAC), Multi-Factor Authentication | ✗ | Multi-layered access control architecture that evaluates real-time trust evidence. Accuracy: Not reported in the original study | Simulation-only evaluation, Synthetic data, Lack of explicit privacy/integrity protocols |
| [150] | 2014 | Cross-Layer Monitoring | VM isolation, Simple Network Management Protocol | ✗ | Cross-layer visibility, High performance stability. Accuracy (as reported): 99% (dataset not described) | Proof-of-concept stage, Evaluated in limited multi-cloud scenarios |
| [151] | 2013 | Increase Data Privacy | Symmetric & Asymmetric Encryption, Chinese Remainder Theorem-Based Secret Sharing, Digital signatures | ✓ | Client-controlled, Data-centric security model. Accuracy: Not reported in the original study | No Secure Search, Computational Overhead Tuning, Implementation Considerations |
| [152] | 2013 | Privacy in service composition | K-means | ✗ | Privacy-preserving design, Computational efficiency. Accuracy (as reported): 99% (dataset not described) | Simulation-only evaluation, Sequential service model |
| Ref. | Year | Factor Considered | Algorithm | Strength | Limitations |
|---|---|---|---|---|---|
| [153] | 2023 | Minimizes monetary cost | Multi-Objective Particle Swarm Optimization (MOPSO) | Outperforms existing methods with better reliability, cost savings, and faster execution. | Excludes indirect cost, human error modelling, and relies on simulated scenarios. |
| [154] | 2022 | reduce execution cost | Fault-tolerant Cost-efficient Workflow Scheduling Algorithm (FCWS) | Reduces execution time and cost, improves reliability, and outperforms existing methods across diverse billing models and cloud platforms. | Fixed reliability evaluation method, No consideration of other cost factors, such as communication cost tiers or spot pricing discounts. |
| [155] | 2021 | Minimize monetary cost and response time | Query Graph Generation, Agent-Based Dynamic Execution | Reduce data transfers, improving accuracy, and ensuring more efficient and cost-effective query processing. | Inaccurate cost estimation, No strong SLA guarantees, only trust-based, focused only on relational models. |
| [156] | 2020 | Minimize total data management cost | NSGA-II based approach | Achieves better efficiency and adaptability, Leveraging real-world cloud data and supporting dynamic access. | Does not address data migration under changing DAF, Availability values are simulated, No support for other SLAs such as latency. |
| [157] | 2019 | Minimize total cost | Workflow Mapping, AllocateVT, ChooseBT | Minimizes financial cost by efficiently managing both computation and communication resources across diverse workflow scenarios. | Assumes fixed VM or bandwidth availability, Uses synthetic workflow generation, Does not account for cloud faults or SLA violations. |
| [158] | 2019 | Minimize storage costs | Random Linear Network Coding (RLNC) | Outperforms traditional redundancy methods by efficiently regenerating data during cloud interruptions. | Focuses only on storage, assumes fog nodes can always access data, and has Limited real-world trace data. |
| [159] | 2018 | Minimize total cost | GetBR, SelectCSP, GetBRA | Adaptive storage mode selection, Achieves cost savings, High availability and flexibility | Focuses only on availability and cost, Ignores security and latency. |
| [160] | 2018 | minimize executing cost | Integer Linear Programming (ILP) | Outperforms existing methods by offering flexible deadline handling, and strong performance in real-world multi-cloud scenarios. | Less Scalable, assumes static scheduling, which is not suitable for real-time dynamic environments. |
| [161] | 2015 | Minimize monetary cost | Heuristic Data-Placement, Storage-Mode Transition | Improves efficiency, reduces expenses, and adapts to changing workloads while avoiding vendor lock-in. | Uses simplified predictor for access frequency, assuming trust in SLAs for availability, Limited to file-level decision granularity, not block-level. |
| [162] | 2015 | Minimize total cost | Centralized optimization | Improves scalability, supports time and budget constraints, and adapts to dynamic cloud conditions using realistic pricing models. | Centralized model lacks scalability, Decentralized model has not yet been implemented, No real-world deployment validation. |
| [163] | 2012 | Minimize total cost | 0–1 Integer Programming Model | Adapting price changes, enabling partial reallocation, and considering real-world constraints. | No integration with real-time cloud APIs, assumes static workload for evaluation. |
| [164] | 2013 | Minimize total infrastructure cost | Improved Greedy Algorithm | Improves resource efficiency using real-world workload data. | Assumes static QoS matrix, Dynamic VM types, and real-time failures not considered. |
| [165] | 2013 | Minimize deployment cost | Genetic Algorithm (GA), Mixed-Integer Programming (MIP) | Offers flexible, cost-effective placement and outperforms traditional solvers on large, real-world multi-cloud scenarios. | No support for dynamic workload evolution; assumes fixed resource specs and static demand, Storage or bandwidth pricing not modelled. |
| [166] | 2011 | Minimize total storage cost | Linear Programming Model (LP-Assignment) | Optimizes storage based on cost and quality of service, Privacy-preserving multi-cloud storage. | Ignores real-time failures and latency, security relies on non-collusion beyond threshold, simulated deployment. |
| [167] | 2011 | Minimize infrastructure cost | Integer Linear Programming (ILP) | Adapts real-time pricing, ensuring minimal performance impact through controlled, User-transparent reconfiguration. | Limited to short-term predictions, ignores migration cost and network latency, and is tested on a limited scale. |
| [168] | 2011 | minimizes cost, and balances resource | Genetic Algorithm (GA) | Outperforms traditional methods, improving efficiency, and adapting to varying workload demands. | No deallocation strategy included, no real-time cloud API integration or real use of provider data. |
| Security Challenges | Nature of the Challenge | Practical Significance |
|---|---|---|
| Policy Alignment | Different providers use distinct policy languages and models [4,96] | Misaligned rules left cloud storage buckets publicly exposed |
| Security Feature Diversity | Threat detection and protection tools vary across clouds [56,143] | Malware slipped past clouds lacking EDR or advanced threat analysis |
| Data Classification Gaps | Sensitivity tags don’t sync between clouds [56,169] | Sensitive data was left unencrypted in one cloud due to misclassification |
| Key Management Complexity | Separate key storage for each cloud makes coordination harder [56,170] | Abandoned encryption keys were later exploited after offboarding failures |
| Compliance & Audit Trouble | Logs and events are stored in silos, hard to correlate [169,170] | Compliance audits delayed due to scattered cloud event records |
| Trust Boundaries Blur | Confusion around which provider is responsible for what [96] | Cross-cloud API traffic went unencrypted and unaudited |
| IAM Fragmentation | IAM tools differ, leading to outdated or unused access controls [4,170] | Former employee’s credentials remained active in a secondary cloud |
| Visibility Gaps | No single SIEM platform can oversee all clouds well [143,171] | A breach in one cloud remained invisible to the organization for days |
| Expanded Attack Surface | More clouds are equal to more APIs, endpoints, identities to defend [4,96,171] | Attackers exploited exposed APIs to move laterally between cloud zones |
| Vendor Lock-In Risks | Lack of portability make migrating workloads harder, increasing dependency [170,171] | Critical apps couldn’t be moved quickly during a provider’s outage, impacting business continuity |
| Cryptographic Technique | Explanation | Primary Advantage |
|---|---|---|
| Shamir’s Secret Sharing [69] | Splits secret into n parts, reconstructable only with k or more | Ensures confidentiality and availability by distributing fragments across clouds |
| Hybrid Encryption (AES+RSA) [174] | AES encrypts data, RSA encrypts AES key | Ensures layered encryption: fast processing with AES and secure key distribution using RSA |
| Blockchain + Hybrid Crypto [174] | Combines AES+RSA with blockchain smart contracts and immutable logs | Enables decentralized access control and tamper-proof traceability of storage actions |
| Homomorphic Encryption [175] | Supports computation directly on encrypted data without decryption | Preserves data privacy during analytics and ML tasks across untrusted clouds |
| Feistel, AES Framework [1] | Feistel-generated keys are used to drive AES encryption rounds over big data slices | Improves encryption speed and randomness; strong avalanche effect across cloud storage |
| Attribute-Based Encryption [172] | Access control tied to attribute policies; only users matching policy can decrypt | Enables fine-grained access control in collaborative multi-cloud environments |
| Identity-Based Encryption [172] | Public key is generated from the user’s identity, simplifying distribution | Eases key management across multi-cloud setups |
| AI Techniques | Explanation | Primary Advantage |
|---|---|---|
| LSTM (Long Short-Term Memory) [177] | Used for time-series anomaly detection in multi-cloud logs by learning sequential patterns. | Achieved 96.5% F1-score in detecting abnormal network behaviour across AWS, Azure, and GCP. |
| Random Forest [177] & Gradient Boosting | Used as hybrid ensemble classifiers for threat classification in AI-based cloud security systems. | Higher detection accuracy than SVM and decision trees. |
| Reinforcement Learning (Q-Learning) [177] | Used for dynamic policy adaptation and firewall rule optimization based on real-time feedback. | Reduced false positives by 26% and improved response time by 19% |
| Self-Supervised Learning (SimCLR, LogBERT) [178] | Learns patterns from unlabeled security logs for detecting zero-day threats. | 96.8% detection accuracy without human-annotated data. |
| Graph Neural Networks (GCN, GAT) [178] | Models cloud interactions as graphs to detect lateral movement and privilege escalation. | Reduced undetected attack rates by 43% |
| Federated Learning [178,179] | Enables anomaly detection across multi-cloud without sharing raw logs, preserving privacy. | 92.5% accuracy and compliant with GDPR/HIPAA. |
| SVM, Decision Trees [176,177] | Traditional ML models for intrusion detection and traffic classification. | Useful in baseline detection tasks, though less accurate than DL models. |
| AI-based SOAR [178] | Automates incident response with threat intelligence feeds and deception systems. | Reduced MTTD by 53% and MTTR by 47% |
| Zero-Trust AI [178,180] | Uses real-time behavioural risk scoring and micro-segmentation with reinforcement learning. | 41% reduction in insider threats. |
| ML Technique | Explanation | Primary Advantage |
|---|---|---|
| Deep Learning (SSAE, DNN, CNN, LSTM) [121,181] | Deep models (especially Stacked Sparse Autoencoders in healthcare multi-cloud) are used to detect subtle or evolving threats from high-dimensional data. | High detection accuracy (>98%), reduced false positives, scalable to edge-core-cloud pipelines. |
| Reinforcement Learning [181] | Proposed as a self-adaptive model for adjusting security decisions based on cloud environment feedback. Mentioned as a future trend in adaptive ML. | Enables intelligent, context-aware, dynamic policy tuning for evolving cloud threats. |
| Federated Learning [182,184] | Mentioned as a promising privacy-preserving method to train ML models across clouds without sharing raw data; applicable to multi-cloud pipelines. | Maintains data locality while improving threat intelligence collaboratively across providers. |
| Fuzzy Logic Techniques | Explanation | Primary Advantage |
|---|---|---|
| Dual Fuzzy Fault Tolerance System [186] | Two fuzzy modules: one for fault detection, one for response; based on system metrics such as response time and throughput. | Achieved 98.03% fault detection accuracy; reduced recovery time. |
| Fuzzy Inference for Job Scheduling [187] | Fuzzifies job length, energy use, memory, and security level to select a suitable VM. | Minimizes makespan and improves resource utilization. |
| Fuzzy Rule-Based Trust Management [188] | Combines subjective feedback and SLA metrics using fuzzy rules to calculate trust levels. | Detects fake feedback, improves trust reliability by up to 20% |
| Fuzzy Risk Assessment Model [189] | Uses asset, threat, and vulnerability matrices; weighted by entropy; mapped through fuzzy evaluation | Enables granular risk evaluation and prioritization |
| Fuzzy Firefly and Load Partitioning [191] | Divides cloud into partitions; fuzzy + firefly algorithm routes load to optimal segment. | Handles heavier loads, reduces execution cost and time. |
| Fuzzy Neural Network Scheduler [191] | Converts input data into linguistic variables, optimized using GA for job-resource mapping. | Reduces completion time and bandwidth use. |
| Fuzzy-AHP + DMM + FIS (FuzzyFortify) [195] | Multi-layered fuzzy model combining AHP and domain mapping for MFA and container risk analysis. | Identifies critical risk nodes in authentication and orchestration. |
| Fuzzy Trust Evaluation (IOWA Aggregation) [191] | Uses CPU, disk, data transfer metrics; fuzzified per time slot; aggregated using IOWA operator. | Captures dynamic trust fluctuations in services. |
| Fuzzy SLA-Based Provisioning [192] | Applies fuzzy rules to workload and resource usage (e.g., CPU, task queue) to trigger VM scaling. | Improved CPU utilization (up to 98.27%) and reduced SLA violations. |
| Fuzzy Access Control Risk Detection [193] | Evaluates user trust, resource sensitivity, and permission strength using 90 fuzzy rules. | Achieved ∼99% accuracy in detecting over-entitlements. |
| Fuzzy Intrusion Detection Framework [194] | Uses fuzzy classifiers with network attributes; combines with ML to reduce false alarms. | Improved generalization to unknown attacks and reduced false positive rate by 23% |
| IAM Technique | Technique Details | Key Benefits |
|---|---|---|
| Role-Based Access Control (RBAC) [79,196,199] | Assigns permissions based on predefined roles within the organization. | Simplifies access management, enforces least privilege, and reduces excessive access risks. |
| Attribute-Based Access Control (ABAC) [196,198] | Grants access based on dynamic attributes such as user location, device type or security clearance. | Enables fine-grained, context-aware access control- adaptable for microservices and multi-cloud. |
| Multi-Factor Authentication (MFA) [79,196,201] | Uses two or more verification factors such as passwords, biometrics, tokens for secure authentication. | Prevents unauthorized access even if credentials are compromised; mitigates credential theft and insider threats. |
| Federated Identity (OAuth, OIDC, SAML) [196,197,198] | Enables SSO and identity federation across cloud platforms; OAuth for delegation, OIDC for identity verification, SAML for SSO. | Reduces credential duplication, improves usability, supports cross-cloud authentication. |
| Zero Trust Architecture (ZTA) [196,200,201] | Enforces continuous identity verification, assumes no implicit trust, and uses dynamic policy evaluation. | Blocks lateral movement, reduces attack surface, enforces strict identity checks for every access attempt. |
| AI/ML-Driven IAM [196,201] | Uses machine learning for anomaly detection, risk scoring, adaptive authentication, and automated policy enforcement. | Enables real-time threat detection, reduces manual workload, and enhances the accuracy of access decisions. |
| Open Policy Agent (OPA) [198] | Implements ABAC in microservices; integrates with Envoy proxy for real-time, decentralized policy enforcement. | Provides fine-grained control over service-to-service access in multi-cloud; decouples logic from code. |
| Centralized IAM (SAP BTP) [201] | Combines AI-powered governance, real-time compliance checks, and centralized identity provisioning using the SAP BTP platform. | Achieves 99.97% policy accuracy, rapid threat detection, and cost-efficient IAM operations. |
| Identity Federation via Broker [198] | Custom identity broker translates identity between providers (e.g., Azure AD). | Ensures seamless identity integration across cloud platforms, reducing session inconsistency. |
| SIEM-Integrated IAM Auditing [196,198] | IAM logs are fed into SIEM systems for anomaly detection and compliance monitoring. | Improves visibility, detects policy violations, and supports regulatory audit trails. |
| Emerging Technologies | Explanation | Key Benefits |
|---|---|---|
| Zero Trust Architecture [202,203,204] | Takes every access request as untrusted and verifies it strictly using MFA and policies. | Strengthens identity control and prevents unauthorized access in multi-cloud setups. |
| Federated Learning [204,205] | Distributes model training across multiple nodes without exposing raw data. | Enhances privacy, lowers data leakage risks, and supports real-time threat detection. |
| Blockchain [204] | Provides secure, decentralized logging and verification for cloud interactions. | Ensures integrity, traceability, and tamper-proof audit trails in cloud workflows |
| Swarm Technologies [133] | Applies rat-inspired optimization (OBL-RIO) to improve intrusion detection feature selection. | Increases detection performance and reduces false alerts in complex traffic data. |
| 6G [205] | Combines AI-native security, federated trust, and ultra-low latency cloud support. | Enables fast, distributed, and secure cloud-edge coordination under 6G networks. |
| Explainable AI [209] | Uses interpretable models such as SHAP and LIME to explain AI-driven security decisions in real time. | Increases analyst trust, reduces false alarms, and improves response clarity in multi-cloud setups. |
| NLP [210] | Enables secure training and deployment of language models for threat intel and communication analysis. | Supports the detection of phishing, social engineering, and chatbot misuse while preserving privacy. |
| Solution | Description | Key Features |
|---|---|---|
| CSPM (Non-peer-reviewed source [211,212]) | Utilizes AI and rule-based automation for remediation and policy enforcement, and identifies misconfigurations and compliance gaps in multi-cloud. | Automated detection of misconfigurations; Continuous alignment with regulatory frameworks |
| CWPP (Non-peer-reviewed source [213]) | Secures workloads, including VMs, containers, and serverless functions through runtime protection, vulnerability management, and behavioural analytics to detect and prevent exploits. | Real-time threat detection across hybrid workloads; Vulnerability scanning, patching, and micro-segmentation |
| CNAPP (Non-peer-reviewed source [212]) | Unifies CSPM and CWPP functions to secure cloud-native applications across their entire lifecycle using integrated APIs and identity analytics. | Enhanced visibility of microservices, APIs, and containerized workloads |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bayzid, L.H.; Kar, T.S.; Islam, M.T.; Islam, M.S.; Ahmed, F. Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment. Future Internet 2025, 17, 548. https://doi.org/10.3390/fi17120548
Bayzid LH, Kar TS, Islam MT, Islam MS, Ahmed F. Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment. Future Internet. 2025; 17(12):548. https://doi.org/10.3390/fi17120548
Chicago/Turabian StyleBayzid, Labib Hasan, Tonny Shekha Kar, Mohammad Tariqul Islam, Md. Shabiul Islam, and Firoz Ahmed. 2025. "Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment" Future Internet 17, no. 12: 548. https://doi.org/10.3390/fi17120548
APA StyleBayzid, L. H., Kar, T. S., Islam, M. T., Islam, M. S., & Ahmed, F. (2025). Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment. Future Internet, 17(12), 548. https://doi.org/10.3390/fi17120548

