Cloud-based video systems: A review of security threats and solutions
Prasad A Hatwalne (),
Abhishek Dhore (),
Rinku Badgujar (),
Manoj Brahme () and
Minal A Pardey ()
Review of Computer Engineering Research, 2025, vol. 12, issue 3, 107-119
Abstract:
With the rapid growth of cloud computing, along with the recent development of video-based applications and social platforms, there is a need for cloud-based video frameworks. These frameworks employ scalable and economical methods for processing, storing, and delivering video content. The shift to the cloud for video services introduces many security concerns that can compromise the integrity, confidentiality, and availability of the video data they handle. Data breaches, unauthorized access, distributed denial of service (DDoS) attacks, vulnerabilities in encryption, and access control mechanisms are the main security challenges faced by cloud-based video frameworks, which this paper thoroughly reviews. This paper explores the challenges and discusses how they can affect both service providers and end users. The review also highlights state-of-the-art solutions presented in the literature and best practices to mitigate these threats. Some prominent solutions include encryption techniques, access control models, intrusion detection systems, and privacy-preserving algorithms. Additionally, the document addresses how advanced technologies like AI and blockchain can be used to enhance the security of cloud-based video services. This review compiles recent research and industry practices, providing a comprehensive overview of the current security posture and effective strategies for constructing a more secure cloud-based video framework in the future.
Keywords: Access control; Cloud security; Data encryption; Intrusion detection; Privacy preservation; Video frameworks. (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://archive.conscientiabeam.com/index.php/76/article/view/4284/8620 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:pkp:rocere:v:12:y:2025:i:3:p:107-119:id:4284
Access Statistics for this article
More articles in Review of Computer Engineering Research from Conscientia Beam
Bibliographic data for series maintained by Dim Michael ().