Identifying the Factors Influencing Improvement of Data Security in Cloud Networks" Case Study: Arabian Gulf Oil Company in Benghazi

Authors

  • Salwa Mohamed Ibrahim Albaraghthi Department of Information system University of Benghazi - Faculty of Information Technology, Libya
  • Mohamed Mustafa Salem Bushaala Department of Software development Higher Institute of Engineering Technologies – Benghazi, Libya
  • Abdallah Shoaib Abdallah Alhssi Faculty Member at the Higher Institute of Science and Technology - Tokra,

Keywords:

Information Security, Cloud Network, Encryption, Data Governance, Regulatory Compliance

Abstract

This research aims to identify the factors influencing the improvement of data security in cloud networks, with a practical application on the Arabian Gulf Oil Company (AGOCO) in Benghazi. The study adopted the OCTAVE-S methodology for risk analysis and used a questionnaire as a tool for data collection from a sample of 81 employees.

The research focused on several key areas: protection of sensitive data, encryption and security technologies, identity and access management, data governance, risk management, and regulatory compliance.The results showed that data protection is a top priority within the company (96.6%), with clear policies for data classification in place, though they require regular updates. Encryption protocols were found to be 82.1% effective, but not sufficiently updated. Participants confirmed the effectiveness of access management (88.8%), while the implementation of multi-factor authentication was found to be limited.

In terms of data governance, employee adherence to policies was moderate (78%). As for regulatory compliance, it reached 83.1%, though there is still a need to fully align with international standards such as ISO 27001 and GDPR.

The study concluded that the company has a good institutional awareness of cybersecurity; however, there are gaps in areas such as updating policies, strengthening encryption protocols, expanding the use of multi-factor authentication, and achieving full compliance with international standards.Based on these findings, the study recommended the development of flexible risk response plans, the adoption of modern security technologies, and stricter enforcement of governance and compliance, all of which contribute to building a secure and reliable cloud environment.

References

A. Anand, N. K. Trivedi, and A. Kumar, "Data security issues and their solutions in cloud computing," Journal of Critical Reviews, vol. 7, no. 14, pp. 2597-2604, 2020. [Online]. Available: https://www.researchgate.net/publication/344336303_DATA_SECURITY_ISSUES_AND_THEIR_SOLUTIONS_IN_CLOUD_COMPUTING.

M. Dawood, S. Tu, C. Xiao, H. Alasmary, M. Waqas, and S. U. Rehman, "Cyberattacks and security of cloud computing: A complete guideline," Symmetry, vol. 15, no. 11, p. 1981, Oct. 2023. DOI: 10.3390/sym15111981.

M. Nazir, "Cloud Computing: Overview & Current Research Challenges," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 8, no. 1, pp. 14-22, Nov.-Dec. 2012. [Online]. Available: www.iosrjournals.org.

GeeksforGeeks, "Cloud Networking," GeeksforGeeks, [Online]. Available: https://www.geeksforgeeks.org/cloud-networking/. Accessed: Feb. 10, 2025.

Arabian Gulf Oil Company, "شركة الخليج العربي للنفط," 2025. [Online]. Available: http://agoco.ly/index.php/ar/. [Accessed: Feb. 25, 2025].

A. Albugmi, M. O. Alassafi, R. Walters, and G. Wills, "Data security in cloud computing," IEEE, pp. 55–59, 2016. DOI: 10.1109/FGCT.2016.7605062.

A. J. Apeh, A. O. Hassan, O. O. Oyewole, O. G. Fakeyede, P. A. Okeleke, and O. R. Adaramodu, "GRC strategies in modern cloud infrastructures: A review of compliance challenges," Computer Science & IT Research Journal, vol. 4, no. 2, pp. 111–125, Nov. 2023. DOI: 10.51594/csitrj.v4i2.609.

D. W. Chadwick and K. Fatema, "A privacy preserving authorisation system for the cloud," Journal of Computer and System Sciences, vol. 78, pp. 1359–1373, 2012. DOI: 10.1016/j.jcss.2011.12.019.

C. Alberts, A. Dorofee, J. Stevens, and C. Woody, OCTAVE®-S Implementation Guide, Version 1.0, Volume 1: Introduction to OCTAVE-S, Software Engineering Institute, Carnegie Mellon University, CMU/SEI-2003-HB-003, Jan. 2005.

R. Gupta, D. Saxena, and A. K. Singh, Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends, arXiv:2108.09508, arXiv, 21 Aug. 2021. DOI: 10.48550/arXiv.2108.09508.

P. J. Sun, "Privacy protection and data security in cloud computing: A survey, challenges, and solutions," IEEE Access, vol. 7, pp. 147420–147452, 2019. DOI: 10.1109/ACCESS.2019.2946185.

K. I. Jones and R. Suchithra, "Information security: A coordinated strategy to guarantee data security in cloud computing," International Journal of Data Informatics and Intelligent Computing, vol. 2, no. 1, pp. 11–31, Mar. 2023. DOI: 10.59461/ijdiic.v2i1.34.

M. Al Morsy, J. Grundy, and I. Müller, An Analysis of the Cloud Computing Security Problem, arXiv:1609.01107, arXiv, 5 Sept. 2016. DOI: 10.48550/arXiv.1609.01107.

R. R. Pansara, "Navigating data management in the cloud - Exploring limitations and opportunities," Transactions on Latest Trends in IoT, vol. 6, no. 6, 2023. [Online]. Available: https://ijsdcs.com/index.php/TLIoT/article/view/348.

A. Chotrani, "Information governance within cloud," International Journal of Information Technology (IJIT), vol. 4, no. 2, pp. 38–44, Jul.–Dec. 2023. [Online]. Available: https://www.researchgate.net/publication/376892752_INFORMATION_GOVERNANCE_WITHIN_CLOUD.

L. Alhenaki, A. Alwatban, B. Alamri, and N. Alarifi, "A survey on the security of cloud computing," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, pp. 1–7, 2019. DOI: 10.1109/CAIS.2019.8769497.

M. Joshi, S. Prakash, S. Budhani, and N. Tewari, "Analytical review of data security in cloud computing," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), IEEE, pp. 362–366, 2021. DOI: 10.1109/ICIEM51511.2021.9445355.

S. Swain and R. K. Tiwari, "Cloud security research - A comprehensive survey," International Journal of Electronics Engineering and Applications, vol. 8, no. 2, pp. 29–39, Jul.–Dec. 2020. [Online]. Available: https://www.ijeea.in/wp-content/uploads/04-Volume-8-Issue-2-Sunita.pdf.

X. Sun, "Critical security issues in cloud computing: A survey," 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE, pp. 216–221, 2018. DOI: 10.1109/BDS/HPSC/IDS18.2018.00053.

A. J. Ouda, A. N. Yousif, A. S. Hasan, H. M. Ibrahim, and M. A. Shyaa, "The impact of cloud computing on network security and the risk for organization behaviors," Webology, vol. 19, no. 1, pp. 195–206, Jan. 2022. DOI: 10.14704/WEB/V19I1/WEB19015.

P. Yang, N. Xiong, and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, vol. 8, pp. 131723-131740, Jul. 2020, doi: 10.1109/ACCESS.2020.3009876.

F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena, "Security by Design for Big Data Frameworks Over Cloud Computing," IEEE Transactions on Engineering Management, Dec. 2020, doi: 10.1109/TEM.2020.3045661.

Downloads

Published

2026-02-05

How to Cite

Salwa Mohamed Ibrahim Albaraghthi, Mohamed Mustafa Salem Bushaala, & Abdallah Shoaib Abdallah Alhssi. (2026). Identifying the Factors Influencing Improvement of Data Security in Cloud Networks" Case Study: Arabian Gulf Oil Company in Benghazi. Journal of Libyan Academy Bani Walid, 2(1), 301–320. Retrieved from https://journals.labjournal.ly/index.php/Jlabw/article/view/458

Issue

Section

Applied Sciences