Abstract
In recent years, use of internet has increased manifold. People have started creating more data, and instead of saving it locally, people have started preferring storing it “online”. Companies are also following the same path to maintain accessibility and availability of their data. Thus, data has become a central part of our lives. People, companies, and institutions rely heavily on cloud storage solutions these days for managing their data. Some of the main cloud storage solution are Google Drive, Dropbox, and OneDrive. These are sophisticated solutions developed by tech giants, and general expectation of the public is that these solutions are reliable. But in the past, there have been instances where data of people and companies was leaked or compromised through these platforms. These platforms use different approaches and models to safeguard their data and for accessing it. The security incidents that happened in past were due to reasons like poorly implemented third party integrations, weak access controls, unexpected API behaviours. This study aims to study these three platforms and compare their vulnerabilities and security controls. The study focuses on cloud specific vulnerabilities like OAuth behaviour, Authentication flow, Exposure to API-based attacks, and Frequency of historical breaches. The study collects and analyses real-world data from several sources, including the HaveIBeenPwned breach records, the CVE database, and datasets. These datasets help in comparing how often each platform appears in reported breaches, what types of weaknesses are most common, and which attack vectors occur repeatedly. The study uses a mix of quantitative and qualitative analysis to present a realistic view of each platform’s strengths and limitations. The findings suggest that no single platform delivers a complete security solution. The study also provides practical recommendations for improving platform security. These recommendations can support organizations that rely on multi-cloud environments where applying single approach is not possible. The overall aim of this thesis is to help organizations better understand the risks related to cloud storage platforms and to support decision-makers in selecting right controls that strengthen data protection practices.
Library of Congress Subject Headings
Cloud computing--Security measures; Computer storage devices--Security measures; Data protection
Publication Date
12-2025
Document Type
Thesis
Student Type
Graduate
Degree Name
Professional Studies (MS)
Department, Program, or Center
Graduate Programs & Research
Advisor
Khalil Al Hussaeni
Advisor/Committee Member
Sanjay Modak
Recommended Citation
Alshamsi, Sultan Majid, "Security vulnerabilities in cloud storage: a comparative study of Google Drive, Dropbox, and OneDrive" (2025). Thesis. Rochester Institute of Technology. Accessed from
https://repository.rit.edu/theses/12459
Campus
RIT Dubai
Plan Codes
PROFST-MS
