A Systematic Review of Literature Gaps in Cloud Cybersecurity

Authors

DOI:

https://doi.org/10.26439/pjm2026.n003.8142

Keywords:

cloud computing cybersecurity, cloud computing, cloud computing cybersecurity risk, cybersecurity, emerging technologies

Abstract

Purpose: This study aims to serve as a reference point for identifying gaps in cloud computing cybersecurity
(CCCS) and the associated cloud computing cybersecurity risks (CCCRs). Furthermore, it seeks to provide guidance on future research directions required to address these gaps. Methodology: The study employs
a systematic literature review of the Google Scholar and Scopus databases, adhering to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines for study selection. Through this process, eleven studies were identified and analysed. Findings: The themes identified regarding CCCRs centred on the weakening of the confidentiality, integrity, and availability (CIA) triad, resulting in less robust cybersecurity infrastructures. The reviewed literature showed consistent perspectives on CCCS,
highlighting the need for further research to deepen understanding of this technology. Accordingly, the
study identifies a gap in the existing research, which generates uncertainty among industry practitioners
and hinders the adoption of cloud computing (CC). Originality/value: The findings complement recent reviews indicating that digital transformation improves efficiency while increasing cybersecurity risks and
requiring organizational resilience frameworks. Unlike studies focusing on technological infrastructure
and security gaps in cloud environments, this research provides a human–organizational perspective by
integrating engagement, life satisfaction, and sufficiency–necessity logic to explain performance.

Downloads

Download data is not yet available.

References

Amazon Web Services, Inc. (n.d.). What is cloud computing? Amazon Web Services. https://aws.amazon.com/what-is-cloud-computing/

Bennasar, H., Bendahmane, A., & Essaaidi, M. (2017). An overview of the state-of-the-art of cloud computing cyber-security. In S. El Hajji, A. Nitaj, & E. Souidi (Eds.), Lecture notes in computer science: Vol. 10194. Codes, cryptology and information security (pp. 56–67). Springer. https://doi.org/10.1007/978-3-319-55589-8_4

Bilge, L., & Dumitras, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 833–844. https://doi.org/10.1145/2382196.2382284

Can, O., Thabit, F., Aljahdali, A. O., Al-Homdy, S., & Alkhzaimi, H. A. (2025). A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing. Cybernetics and Systems, 56(5), 413–447. https://doi.org/10.1080/01969722.2023.2175117

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21. https://doi.org/10.22215/timreview/835

Dawson, J. K., Twum, F., Hayfron Acquah, J. B., & Missah, Y. M. (2023a). Reconnoitering security algorithms performance in the cloud: Systematic literature review based on the PRISMA archetype. Journal of Theoretical and Applied Information Technology, 101(6), 2203–2227. http://www.jatit.org/volumes/Vol101No6/14Vol101No6.pdf

Dawson, J. K., Twum, F., Hayfron Acquah, J. B., & Missah, Y. M. (2023b). PRISMA archetype-based systematic literature review of security algorithms in the cloud. Security and Communication Networks, 2023(1), Article 9210803. https://doi.org/10.1155/2023/9210803

Douglis, F., & Nieh, J. (2019). Microservices and containers. IEEE Internet Computing, 23(6), 5–6. https://doi.org/10.1109/MIC.2019.2955784

Ganne, A. (2022). Emerging business trends in cloud computing. International Research Journal of Modernization in Engineering Technology and Science, 4(12), 459–462. https://doi.org/10.56726/irjmets32082

Hernandez, A. (2022). What are the emerging and future technologies that we will have to worry the most about from a security perspective? [Course paper]. Old Dominion University. https://sites.wp.odu.edu/aaronhernandez/wpcontent/uploads/sites/17871/2023/04/CYSE-426-Project-Paper.pdf

Institute of Risk Management. (2014). Cyber risk: Resources for practitioners [White paper]. Institute of Risk Management. https://www.theirm.org/media/7237/irm-cyber-risk-resources-for-practitioners.pdf

Jha, R., Kumari, N., & Omeribe, C. C. (2023). Cloud privacy and security- A review paper. Vidhyayana, 8(7), 333–351. https://www.vidhyayanaejournal.org/journal/article/view/828

Khan, S., Khan, S., & Galibeen, S. (2011). Cloud computing an emerging technology: Changing ways of libraries collaboration. International Research: Journal of Library and Information Science, 1(2), 151–159. https://www.proquest.com/docview/1267541922

Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering (EBSE Technical Report EBSE-2007-01). Software Engineering Group, School of Computer Science and Mathematics, Keele University & Department of Computer Science, University of Durham.

Komar, R., Patil, A., & Ali, W. A. (2023). Emerging trends in cloud computing: A comprehensive analysis of deployment models and service models for scalability, flexibility, and security enhancements. Journal of Intelligent Systems and Applied Data Science, 1(1), 20–28. https://jisads.com/index.php/1/article/view/10/5

Li, Y., Lin, Y., Wang, Y., Ye, K., & Xu, C. (2023). Serverless computing: State-of-the-art, challenges and opportunities. IEEE Transactions on Services Computing, 16(2), 1522–1539. https://doi.org/10.1109/TSC.2022.3166553

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (NIST Special Publication 800145). U.S. Department of Commerce, National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-145

Microsoft. (n.d.). What is cloud computing? Azure. https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/

Minna, F., & Massacci, F. (2023). SoK: Runtime security for cloud microservices. Are we there yet? Computers & Security, 127, Article 103119. https://doi.org/10.1016/j.cose.2023.103119

Naseri, F., Kazemi, Z., Larsen, P. G., Arefi, M. M., & Schaltz, E. (2023). Cyberphysical cloud battery management systems: Review of security aspects. Batteries, 9(7), 382. https://doi.org/10.3390/batteries9070382

National Institute of Standards and Technology. (n.d.). Cybersecurity. In NIST glossary. Retrieved from https://csrc.nist.gov/glossary/term/cybersecurity

Nightingale, A. (2009). A guide to systematic literature reviews. Surgery (Oxford), 27(9), 381–384. https://doi.org/10.1016/j.mpsur.2009.07.005

Nobanee, H., Alodat, A., Bajodah, R., AlAli, M., & Al Darmaki, A. (2023). Bibliometric analysis of cybercrime and cybersecurity risks literature. Journal of Financial Crime, 30(6), 1736–1754. https://doi.org/10.1108/JFC-11-2022-0287

Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., Shamseer, L., Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou, R., Glanville, J., Grimshaw, J. M., Hróbjartsson, A., Lalu, M. M., Li, T., Loder, E. W., MayoWilson, E., McDonald, S., … Moher, D. (2021). The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. British Medical Journal, 372(71), 1–9. https://doi.org/10.1136/bmj.n71

Pawlicki, M., Pawlicka, A., Kozik, R., & Choraś, M. (2023). The survey and metaanalysis of the attacks, transgressions, countermeasures and security aspects common to Cloud, Edge and IoT. Neurocomputing, 551(C), Article 126533. https://doi.org/10.1016/j.neucom.2023.126533

Rahaman, M. S., Islam, A., Cerny, T., & Hutton, S. (2023). Staticanalysisbased solutions to security challenges in CloudNative systems: Systematic mapping study. Sensors, 23(4), Article 1755. https://doi.org/10.3390/s23041755

Rotolo, D., Hicks, D., & Martin, B. R. (2015). What is an emerging technology? Research Policy, 44(10), 1827–1843. https://doi.org/10.1016/j.respol.2015.06.006

Soveizi, N., Turkmen, F., & Karastoyanova, D. (2023). Security and privacy concerns in cloudbased scientific and business workflows: A systematic review. Future Generation Computer Systems, 148, 184–200. https://doi.org/10.1016/j.future.2023.05.015

Spelman, R. (2015, October 26). The definition of cloud computing. Cloud Security Alliance. https://cloudsecurityalliance.org/blog/2015/10/26/the-definition-of-cloud-computing/

Surianarayanan, C., & Chelliah, P. R. (2023). Integration of the Internet of Things and Cloud: Security challenges and solutions – A review. International Journal of Cloud Applications and Computing, 13(1), 1–30. https://doi.org/10.4018/ijcac.325624

Susnjara, S., & Smalley, I. (n.d.). What is cloud computing? IBM. https://www.ibm.com/topics/cloud-computing/

Xu, D. (2010). Cloud computing: An emerging technology. Proceedings of the 2010 International Conference on Computer Design and Applications (ICCDA 2010), Qinhuangdao, China, 37–40. https://doi.org/10.1109/ICCDA.2010

Downloads

Published

2026-04-16

Issue

Section

Artículos

How to Cite

A Systematic Review of Literature Gaps in Cloud Cybersecurity. (2026). Peruvian Journal of Management (PJM), 003, 135-160. https://doi.org/10.26439/pjm2026.n003.8142