A Systematic Review of Literature Gaps in Cloud Cybersecurity
DOI:
https://doi.org/10.26439/pjm2026.n003.8142Keywords:
cloud computing cybersecurity, cloud computing, cloud computing cybersecurity risk, cybersecurity, emerging technologiesAbstract
Purpose: This study aims to serve as a reference point for identifying gaps in cloud computing cybersecurity
(CCCS) and the associated cloud computing cybersecurity risks (CCCRs). Furthermore, it seeks to provide guidance on future research directions required to address these gaps. Methodology: The study employs
a systematic literature review of the Google Scholar and Scopus databases, adhering to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines for study selection. Through this process, eleven studies were identified and analysed. Findings: The themes identified regarding CCCRs centred on the weakening of the confidentiality, integrity, and availability (CIA) triad, resulting in less robust cybersecurity infrastructures. The reviewed literature showed consistent perspectives on CCCS,
highlighting the need for further research to deepen understanding of this technology. Accordingly, the
study identifies a gap in the existing research, which generates uncertainty among industry practitioners
and hinders the adoption of cloud computing (CC). Originality/value: The findings complement recent reviews indicating that digital transformation improves efficiency while increasing cybersecurity risks and
requiring organizational resilience frameworks. Unlike studies focusing on technological infrastructure
and security gaps in cloud environments, this research provides a human–organizational perspective by
integrating engagement, life satisfaction, and sufficiency–necessity logic to explain performance.
Downloads
References
Amazon Web Services, Inc. (n.d.). What is cloud computing? Amazon Web Services. https://aws.amazon.com/what-is-cloud-computing/
Bennasar, H., Bendahmane, A., & Essaaidi, M. (2017). An overview of the state-of-the-art of cloud computing cyber-security. In S. El Hajji, A. Nitaj, & E. Souidi (Eds.), Lecture notes in computer science: Vol. 10194. Codes, cryptology and information security (pp. 56–67). Springer. https://doi.org/10.1007/978-3-319-55589-8_4
Bilge, L., & Dumitras, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 833–844. https://doi.org/10.1145/2382196.2382284
Can, O., Thabit, F., Aljahdali, A. O., Al-Homdy, S., & Alkhzaimi, H. A. (2025). A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing. Cybernetics and Systems, 56(5), 413–447. https://doi.org/10.1080/01969722.2023.2175117
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21. https://doi.org/10.22215/timreview/835
Dawson, J. K., Twum, F., Hayfron Acquah, J. B., & Missah, Y. M. (2023a). Reconnoitering security algorithms performance in the cloud: Systematic literature review based on the PRISMA archetype. Journal of Theoretical and Applied Information Technology, 101(6), 2203–2227. http://www.jatit.org/volumes/Vol101No6/14Vol101No6.pdf
Dawson, J. K., Twum, F., Hayfron Acquah, J. B., & Missah, Y. M. (2023b). PRISMA archetype-based systematic literature review of security algorithms in the cloud. Security and Communication Networks, 2023(1), Article 9210803. https://doi.org/10.1155/2023/9210803
Douglis, F., & Nieh, J. (2019). Microservices and containers. IEEE Internet Computing, 23(6), 5–6. https://doi.org/10.1109/MIC.2019.2955784
Ganne, A. (2022). Emerging business trends in cloud computing. International Research Journal of Modernization in Engineering Technology and Science, 4(12), 459–462. https://doi.org/10.56726/irjmets32082
Hernandez, A. (2022). What are the emerging and future technologies that we will have to worry the most about from a security perspective? [Course paper]. Old Dominion University. https://sites.wp.odu.edu/aaronhernandez/wpcontent/uploads/sites/17871/2023/04/CYSE-426-Project-Paper.pdf
Institute of Risk Management. (2014). Cyber risk: Resources for practitioners [White paper]. Institute of Risk Management. https://www.theirm.org/media/7237/irm-cyber-risk-resources-for-practitioners.pdf
Jha, R., Kumari, N., & Omeribe, C. C. (2023). Cloud privacy and security- A review paper. Vidhyayana, 8(7), 333–351. https://www.vidhyayanaejournal.org/journal/article/view/828
Khan, S., Khan, S., & Galibeen, S. (2011). Cloud computing an emerging technology: Changing ways of libraries collaboration. International Research: Journal of Library and Information Science, 1(2), 151–159. https://www.proquest.com/docview/1267541922
Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering (EBSE Technical Report EBSE-2007-01). Software Engineering Group, School of Computer Science and Mathematics, Keele University & Department of Computer Science, University of Durham.
Komar, R., Patil, A., & Ali, W. A. (2023). Emerging trends in cloud computing: A comprehensive analysis of deployment models and service models for scalability, flexibility, and security enhancements. Journal of Intelligent Systems and Applied Data Science, 1(1), 20–28. https://jisads.com/index.php/1/article/view/10/5
Li, Y., Lin, Y., Wang, Y., Ye, K., & Xu, C. (2023). Serverless computing: State-of-the-art, challenges and opportunities. IEEE Transactions on Services Computing, 16(2), 1522–1539. https://doi.org/10.1109/TSC.2022.3166553
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (NIST Special Publication 800145). U.S. Department of Commerce, National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-145
Microsoft. (n.d.). What is cloud computing? Azure. https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/
Minna, F., & Massacci, F. (2023). SoK: Runtime security for cloud microservices. Are we there yet? Computers & Security, 127, Article 103119. https://doi.org/10.1016/j.cose.2023.103119
Naseri, F., Kazemi, Z., Larsen, P. G., Arefi, M. M., & Schaltz, E. (2023). Cyberphysical cloud battery management systems: Review of security aspects. Batteries, 9(7), 382. https://doi.org/10.3390/batteries9070382
National Institute of Standards and Technology. (n.d.). Cybersecurity. In NIST glossary. Retrieved from https://csrc.nist.gov/glossary/term/cybersecurity
Nightingale, A. (2009). A guide to systematic literature reviews. Surgery (Oxford), 27(9), 381–384. https://doi.org/10.1016/j.mpsur.2009.07.005
Nobanee, H., Alodat, A., Bajodah, R., AlAli, M., & Al Darmaki, A. (2023). Bibliometric analysis of cybercrime and cybersecurity risks literature. Journal of Financial Crime, 30(6), 1736–1754. https://doi.org/10.1108/JFC-11-2022-0287
Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., Shamseer, L., Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou, R., Glanville, J., Grimshaw, J. M., Hróbjartsson, A., Lalu, M. M., Li, T., Loder, E. W., MayoWilson, E., McDonald, S., … Moher, D. (2021). The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. British Medical Journal, 372(71), 1–9. https://doi.org/10.1136/bmj.n71
Pawlicki, M., Pawlicka, A., Kozik, R., & Choraś, M. (2023). The survey and metaanalysis of the attacks, transgressions, countermeasures and security aspects common to Cloud, Edge and IoT. Neurocomputing, 551(C), Article 126533. https://doi.org/10.1016/j.neucom.2023.126533
Rahaman, M. S., Islam, A., Cerny, T., & Hutton, S. (2023). Staticanalysisbased solutions to security challenges in CloudNative systems: Systematic mapping study. Sensors, 23(4), Article 1755. https://doi.org/10.3390/s23041755
Rotolo, D., Hicks, D., & Martin, B. R. (2015). What is an emerging technology? Research Policy, 44(10), 1827–1843. https://doi.org/10.1016/j.respol.2015.06.006
Soveizi, N., Turkmen, F., & Karastoyanova, D. (2023). Security and privacy concerns in cloudbased scientific and business workflows: A systematic review. Future Generation Computer Systems, 148, 184–200. https://doi.org/10.1016/j.future.2023.05.015
Spelman, R. (2015, October 26). The definition of cloud computing. Cloud Security Alliance. https://cloudsecurityalliance.org/blog/2015/10/26/the-definition-of-cloud-computing/
Surianarayanan, C., & Chelliah, P. R. (2023). Integration of the Internet of Things and Cloud: Security challenges and solutions – A review. International Journal of Cloud Applications and Computing, 13(1), 1–30. https://doi.org/10.4018/ijcac.325624
Susnjara, S., & Smalley, I. (n.d.). What is cloud computing? IBM. https://www.ibm.com/topics/cloud-computing/
Xu, D. (2010). Cloud computing: An emerging technology. Proceedings of the 2010 International Conference on Computer Design and Applications (ICCDA 2010), Qinhuangdao, China, 37–40. https://doi.org/10.1109/ICCDA.2010
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
COPYRIGHT
All published works are subject to a Creative Commons BY 4.0 license. This license allows sharing the material in any medium or format, as well as adapting, transforming, and building upon the material for any purpose. Both possibilities are only allowed to the extent that the attribution condition is met. This condition requires giving appropriate credit to both the author and the journal, providing a link to the license, and indicate if changes were made. This can be done in any reasonable manner, but not in a way that suggests the licensor endorses you or your use of the material.
Property Rights:
The Creative Commons BY 4.0 license allows authors to retain the patrimonial rights of their work without restrictions. If any work published by the PJM journal is distributed, disseminated, or any other action contemplated in the license, the author or authors and the journal must be mentioned in a visible and explicit manner.
(2)_.png)
.png)



