Abdullah Omer
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Abdulrahman Luai
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Mohammed ALomiri
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Ahmed Abdulnasser
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Anas Essa
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Abdulrahman Hasan
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Al-Qasem Ebrahim
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Rami Wadee
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Mohammed Fadhl Abdullah
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
Nasr Alsakkaf
Computing Department, Faculty of Engineering & Computers, University of Science & Technology, Aden – Yemen.
الملخص
Cloud computing has fundamentally transformed modern IT by offering scalable, cost-effective services. However, its rapid adoption has introduced critical cybersecurity concerns. This study investigates the impact of cloud technology on information security, focusing on key challenges such as data breaches, unauthorized access, and regulatory compliance. Employing a literature-based approach complemented by a quantitative user survey, it evaluates existing security measures, including encryption, multi-factor authentication, and adherence to frameworks like GDPR and HIPAA. The findings highlight that while cloud computing significantly improves accessibility and efficiency, it also necessitates robust security strategies. The study concludes by recommending enhanced encryption, comprehensive user education, and stringent governance policies to strengthen cloud security and ensure the reliability and trustworthiness of cloud-based systems.