To see the other types of publications on this topic, follow the link: Cloud Security Posture Management.

Journal articles on the topic 'Cloud Security Posture Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud Security Posture Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Journal, of Global Research in Electronics and Communications. "Cloud Security Posture Management: Tools and Techniques." Journal of Global Research in Electronics and Communications 1, no. 4 (2025): 1–6. https://doi.org/10.5281/zenodo.15115056.

Full text
Abstract:
Cloud Security Posture Management (CSPM) is important for the maintenance of secured cloud infrastructure; CSPM has two main areas of focus: the assessment of cloud security setup and making improvements during the delivery of services. With the exponential growth in cloud's widespread adoption across sectors, proactive data protection against breaches and misconfigurations, as well as compliance violations, has become critical. CSPM tools help organizations identify security vulnerabilities and bridge compliance lines, as well as enable automated remediation strategies. Research provides pers
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Ashish Kumar. "Cloud Security Posture Management in Server-less Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1248–53. https://doi.org/10.22214/ijraset.2025.72290.

Full text
Abstract:
The widespread adoption of server-less computing models, characterized by their event-driven architectures and finegrained resource abstraction, has introduced novel security challenges that traditional Cloud Security Posture Management (CSPM) solutions are ill-equipped to address. In server-less environments, the ephemeral nature of functions, coupled with complex inter-dependencies and rapid deployment cycles, exacerbates risks associated with misconfigurations, privilege escalation, insecure APIs, and insufficient monitoring. This paper examines the evolution of CSPM methodologies in respon
APA, Harvard, Vancouver, ISO, and other styles
3

G Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.

Full text
Abstract:
As organizations increasingly adopt multi-cloud environments and containerized applications to improve scalability and operational efficiency, managing security across these diverse platforms has become a critical challenge. Traditional security tools and manual processes are insufficient to handle the complexity and dynamic nature of modern cloud infrastructures. This research introduces Cloud Guardian, a cloud security posture management (CSPM) platform that automates security assessments, policy enforcement, and threat detection across multi-cloud platforms and containerized environments. C
APA, Harvard, Vancouver, ISO, and other styles
4

Rahman, Anisur, Md Ashrafuzzaman, Md Majadul Islam Jim, and Rebeka Sultana. "CLOUD SECURITY POSTURE MANAGEMENT AUTOMATING RISK IDENTIFICATION AND RESPONSE IN CLOUD INFRASTRUCTURES." ACADEMIC JOURNAL ON SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS EDUCATION 4, no. 3 (2024): 151–62. http://dx.doi.org/10.69593/ajsteme.v4i03.103.

Full text
Abstract:
Cloud Security Posture Management (CSPM) tools have become essential in addressing the growing security challenges faced by organizations as they migrate to cloud environments. This study explores the effectiveness of CSPM tools in automating the identification and response to security risks within cloud infrastructures, highlighting their role in reducing misconfigurations, improving compliance, and enhancing overall security posture. Through a mixed-method approach, combining a comprehensive literature review, a survey of IT security professionals, and detailed case study analyses, this rese
APA, Harvard, Vancouver, ISO, and other styles
5

Santosh Datta Bompally. "Comprehensive approach to cloud security posture management: From infrastructure as code to AI-driven monitoring." Open Access Research Journal of Engineering and Technology 8, no. 2 (2025): 081–87. https://doi.org/10.53022/oarjet.2025.8.2.0046.

Full text
Abstract:
Cloud Security Posture Management (CSPM) has emerged as a critical framework for safeguarding multi-cloud environments against growing threats while maintaining operational efficiency. This article comprehensively examines CSPM evolution from fundamental principles to advanced capabilities leveraging artificial intelligence. The discussion encompasses four essential components: Infrastructure as Code scanning, Cloud Native Security, Reactive Security, and Security Monitoring, detailing how each contributes to a robust security framework. Integrating these components across the cloud lifecycle
APA, Harvard, Vancouver, ISO, and other styles
6

Srinivas Reddy Cheruku. "AI-Driven Security Posture Management: A Revolutionary Approach to Multi-Cloud Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 497–509. https://doi.org/10.32628/cseit25111237.

Full text
Abstract:
The landscape of cloud security has undergone a transformative evolution, driven by the complexity of modern digital infrastructures and the escalating sophistication of cyber threats. This comprehensive article explores an innovative AI-driven Cloud Security Posture Management (CSPM) framework that transcends traditional security methodologies. By leveraging advanced machine learning algorithms, neural network architectures, and intelligent automation, the framework offers a proactive, adaptive approach to cybersecurity that addresses the multifaceted challenges of multi-cloud environments. T
APA, Harvard, Vancouver, ISO, and other styles
7

Veeraballi, Vishnuvardhana Reddy. "UNDERSTANDING CLOUD SECURITY POSTURE MANAGEMENT (CSPM): A COMPREHENSIVE GUIDE." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 3168–79. https://doi.org/10.34218/ijrcait_08_01_228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goyal, Bhaskar. "Augmented Intelligence for Cloud Architects: AI-Powered Tools for Design and Management." European Journal of Computer Science and Information Technology 13, no. 6 (2025): 54–62. https://doi.org/10.37745/ejcsit.2013/vol13n65462.

Full text
Abstract:
Augmented intelligence represents a transformative paradigm for cloud architects, enhancing their capabilities through AI-powered tools across the entire cloud lifecycle. The integration of these technologies addresses the growing complexity of modern cloud environments, where performance isolation issues, multi-cloud deployments, and dynamic workloads create significant challenges. Through strategic implementation of machine learning algorithms, cloud architects gain substantial advantages in architecture design, cost management, security posture, and operational monitoring. The augmented int
APA, Harvard, Vancouver, ISO, and other styles
9

Xing, Jingyu, and Zheng Zhang. "Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments." Security and Communication Networks 2022 (March 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/6783223.

Full text
Abstract:
This paper presents an in-depth study and analysis of hierarchical network security measurement and optimal active defense in the cloud computing environment. All the cloud platform security-related data collected through cloud platform monitoring is collected, and then the relevant security data is summarized and analyzed, so that the specific security posture index of the cloud platform can be derived, thus providing a reference for cloud platform managers to judge the security risks of the cloud platform. It provides a reference for cloud platform managers to judge the security risks of clo
APA, Harvard, Vancouver, ISO, and other styles
10

Researcher. "EVALUATING THE EFFECTIVENESS OF CSPM TOOLS IN MULTI-CLOUD ENVIRONMENTS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 2074–85. https://doi.org/10.5281/zenodo.14333702.

Full text
Abstract:
This article examines the capabilities, difficulties, and potential of Cloud Security Posture Management (CSPM) solutions in multi-cloud systems to assess their efficacy. It examines how businesses use CSPM solutions from key cloud providers like AWS, Azure, and GCP, emphasizing important features like compliance management, policy standardization, and detection and response systems. The article highlights the role that CSPM technologies play in tackling the increasing complexity of multi-cloud security by examining their development from simple configuration checkers to comprehensive security
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Qianfeng, Lun Wang, and Daoming Li. "Managing Network Security in Cloud Computing: Analyzing Vulnerabilities and Implementing Effective Defense Strategies." Journal of Economic Theory and Business Management 1, no. 4 (2024): 18–27. https://doi.org/10.5281/zenodo.13232751.

Full text
Abstract:
Cloud computing has revolutionized the way businesses operate, offering unparalleled flexibility, scalability, and cost savings. However, the shift to cloud environments has also introduced new security challenges. This paper delves into the network security aspects of cloud computing, analyzing vulnerabilities inherent to cloud architectures and proposing robust defense strategies. Through a comprehensive review of existing literature and case studies, the paper provides insights into the complexities of securing cloud networks, with a focus on management practices. It also explores emerging
APA, Harvard, Vancouver, ISO, and other styles
12

Muralidhara, Pavan, and Vaishnavi Janardhan. "Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments." International Journal of Scientific Research and Management (IJSRM) 4, no. 9 (2016): 4636–64. https://doi.org/10.18535/ijsrm/v4i9.22.

Full text
Abstract:
As organisations are deploying multiple clouds to scale, gain flexibility and cost optimisation the challenge of securing these architectures grows exponentially. Conventional logical security platforms that are based on perimeters cannot effectively guard current complex cloud environments. Currently, however, there is a need to develop methods for their implementation, which refers to the Zero Trust Architecture (ZTA) approach with the overall slogan “Never Trust, Always Verify”. This security model means that any user, device, and network request is authenticated, authorized and monitored a
APA, Harvard, Vancouver, ISO, and other styles
13

Shriwas, Rakhi, Rahul Kumar Sen, Vishnu Agrawal, Jitendra Singh Chouhan, and Saurbh Tege. "UPGRADING CYBERSECURITY: INVESTIGATING THE SECURITY BENEFITS OF CLOUD COMPUTING." International Journal of Technical Research & Science 9, Spl (2024): 27–35. http://dx.doi.org/10.30780/specialissue-iset-2024/051.

Full text
Abstract:
Cloud computing has revolutionized the landscape of cybersecurity, offering a myriad of advantages over traditional on-premises systems. This abstract explores the security benefits of cloud computing, highlighting its role in enhancing data protection, scalability, disaster recovery, proactive threat detection, centralized management, cost-effectiveness, and continuous updates. By leveraging the cloud, organizations can bolster their security posture, mitigate risks, and ensure business continuity in the face of evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
14

Igwenagu, Udochukwu ThankGod Ikechukwu, Abidemi Ayodotun Salami, Abayomi Shamsudeen Arigbabu, Cassandra Esambe Mesode, Tunbosun Oyewale Oladoyinbo, and Oluwaseun Oladeji Olaniyi. "Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing." Journal of Engineering Research and Reports 26, no. 6 (2024): 60–75. http://dx.doi.org/10.9734/jerr/2024/v26i61162.

Full text
Abstract:
This research paper explores the effectiveness of integrated cybersecurity strategies, focusing on the amalgamation of cloud computing security, database protection, and penetration testing into a unified risk management framework. The primary aim is to evaluate how such integration impacts the overall cybersecurity posture of organizations, offering insights into mitigating cyber threats, unauthorized access, and data breaches. Employing a survey-based methodology, the study gathered data from 365 professionals across cloud computing, database administration, and cybersecurity fields. Through
APA, Harvard, Vancouver, ISO, and other styles
15

Bapi, Raju Ipperla, and Waghela Digvijay. "Architecting Secure Big Data Environments: Risk Management Strategies for Hadoop, Spark, and Cloud Deployments." Sarcouncil Journal of Applied Sciences 5, no. 2 (2025): 1–9. https://doi.org/10.5281/zenodo.15053574.

Full text
Abstract:
The rapid growth of big data has introduced significant challenges in ensuring data security, access control, and compliance in cloud-native architectures. This study explores a conceptual framework for securing big data environments by integrating robust data governance, encryption mechanisms, real-time monitoring, risk assessment, and incident response strategies. By leveraging system intelligence and automation, organizations can enhance data protection, reduce vulnerabilities, and improve scalability. The framework highlights the interdependencies between key security components, emphasizi
APA, Harvard, Vancouver, ISO, and other styles
16

Sai Teja Battula. "A Comprehensive Framework for Evaluating the Scalability and Security of Fintech Web Applications in a Cloud-Native Environment." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1940–50. https://doi.org/10.32628/cseit23112567.

Full text
Abstract:
This article presents a comprehensive framework for evaluating and designing cloud-native fintech applications that balance scalability requirements with robust security postures. As financial institutions increasingly migrate to cloud environments, they face complex challenges at the intersection of technological innovation, regulatory compliance, and cybersecurity. The article examines core architectural considerations, including scalability patterns like microservices and event-driven design, alongside essential security frameworks such as zero-trust architecture and defense-in-depth strate
APA, Harvard, Vancouver, ISO, and other styles
17

Nikhil Tej Gandhi. "CSPM for Healthcare: Securing Electronic Health Records (EHR) and Ensuring HIPAA Compliance." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1297–305. https://doi.org/10.32628/cseit241061174.

Full text
Abstract:
Cloud Security Posture Management (CSPM) has emerged as a critical solution for healthcare organizations navigating the complexities of digital transformation and cloud adoption. This comprehensive article examines how CSPM tools help healthcare providers secure Electronic Health Records (EHR) while maintaining HIPAA compliance in cloud environments. The article explores key challenges in maintaining data privacy and security requirements, evaluates the role of CSPM in automated security assessment and compliance monitoring, and presents real-world case studies demonstrating successful impleme
APA, Harvard, Vancouver, ISO, and other styles
18

Mamidi, Sundeep Reddy. "Dynamic Security Policies for Cloud Infrastructures: An AI-Based Framework." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 1, no. 1 (2024): 200–211. http://dx.doi.org/10.60087/jaigs.v1i1.159.

Full text
Abstract:
The rapid expansion of cloud computing has introduced significant challenges in maintaining robust security policies due to the dynamic and scalable nature of cloud environments. This research presents an AI-based framework for developing and implementing dynamic security policies in cloud infrastructures. The proposed framework leverages machine learning algorithms to analyze and predict potential security threats, enabling the real-time adaptation of security measures. By continuously monitoring cloud resources and utilizing intelligent threat detection mechanisms, the framework ensures a pr
APA, Harvard, Vancouver, ISO, and other styles
19

Krupal Gangapatnam. "Proactive Security with AI: Revolutionizing Cloud Infrastructure Protection." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 277–84. https://doi.org/10.32996/jcsts.2025.7.3.31.

Full text
Abstract:
The integration of artificial intelligence in cloud security represents a transformative shift in how organizations protect their digital infrastructure. AI-driven security automation has revolutionized threat detection, response mechanisms, and vulnerability management across enterprise environments. Organizations implementing these advanced systems have experienced significant improvements in threat detection capabilities, reduced response times, and enhanced operational efficiency. The combination of machine learning models, behavioral analytics, and automated response mechanisms has enable
APA, Harvard, Vancouver, ISO, and other styles
20

Rehana Sultana Khan. "The evolution of AI-assisted cloud management: transforming enterprise infrastructure." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 248–59. https://doi.org/10.30574/wjaets.2025.15.2.0490.

Full text
Abstract:
Cloud computing has fundamentally transformed enterprise IT infrastructure, but organizations face mounting challenges as they navigate increasingly complex multi-cloud and hybrid environments. As deployment strategies diversify, traditional management approaches struggle with the scale, dynamism, and complexity of modern cloud ecosystems. Artificial intelligence has emerged as a critical enabler for addressing these challenges, delivering automated solutions that optimize performance, enhance security posture, and reduce operational expenditure across distributed infrastructures. AI-powered c
APA, Harvard, Vancouver, ISO, and other styles
21

Rehana Sultana Khan. "Security challenges and mitigation strategies in multi-cloud environments: A comprehensive analysis." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3725–31. https://doi.org/10.30574/wjarr.2025.26.1.1502.

Full text
Abstract:
Multi-cloud architectures have emerged as the dominant enterprise computing strategy, with organizations increasingly distributing workloads across multiple cloud service providers to enhance operational flexibility, geographical resilience, and service specialization. This comprehensive examination of multi-cloud security challenges reveals significant complexities across identity management, data protection, configuration governance, and compliance frameworks. The heterogeneous nature of distributed cloud environments creates unique security vulnerabilities at integration points, particularl
APA, Harvard, Vancouver, ISO, and other styles
22

Abbagalla, Sindhooja, and Srividhya Gavini. "SMART SECURITY SOLUTIONS FOR CLOUD INFRASTRUCTURE USING MACHINE LEARNING." International Journal of Interpreting Enigma Engineers 01, no. 02 (2024): 08–14. http://dx.doi.org/10.62674/ijiee.2024.v1i02.002.

Full text
Abstract:
Cloud computing has become a ubiquitous storage, processing, and data management tool. However, providing strong security measures inside cloud infrastructure remains a primary priority.The purpose of this study is to give an overview of the process of integrating cloud infrastructure with machine learning. The main objective of this work is to leverage machine learning approaches and models for threat identification, anomaly detection, and access control methods in order to protect sensitive data and reduce growing risks in the cloud infrastructure. Ultimately, this research endeavours to enh
APA, Harvard, Vancouver, ISO, and other styles
23

Adebola Folorunso, Viqaruddin Mohammed, Ifeoluwa Wada, and Bunmi Samuel. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. http://dx.doi.org/10.30574/wjarr.2024.24.1.3169.

Full text
Abstract:
The increasing frequency and sophistication of cyber threats have made organizations need to adopt robust cybersecurity frameworks. ISO security standards, particularly the ISO/IEC 27000 series, play a critical role in enhancing organizations' cybersecurity posture worldwide. These standards provide a systematic approach to managing sensitive information, ensuring its confidentiality, integrity, and availability. ISO/IEC 27001, which focuses on establishing an Information Security Management System (ISMS), is widely recognized for its ability to help organizations identify, manage, and mitigat
APA, Harvard, Vancouver, ISO, and other styles
24

Vora, Vaibhav Anil. "Transforming Telecommunications and Finance: The Role of Cloud Identity Management." European Journal of Computer Science and Information Technology 13, no. 15 (2025): 70–83. https://doi.org/10.37745/ejcsit.2013/vol13n157083.

Full text
Abstract:
Cloud identity management represents a transformative force in telecommunications and finance, revolutionizing how organizations approach security, operations, and customer experiences in increasingly distributed environments. Through innovative technologies including federated identity frameworks, single sign-on architectures, and adaptive authentication mechanisms, cloud identity solutions enable organizations to overcome traditional limitations of fragmented identity infrastructures while addressing industry-specific challenges. In telecommunications, these solutions facilitate optimized cu
APA, Harvard, Vancouver, ISO, and other styles
25

Sandhya, Guduru. "Cloud Security Automation: Enforcing CIS Benchmarks with AWS Config, Azure Policy, and OpenStack Chef Cookbooks." Journal of Scientific and Engineering Research 7, no. 10 (2020): 243–48. https://doi.org/10.5281/zenodo.15234591.

Full text
Abstract:
As cloud environments grow increasingly complex, organizations face challenges in maintaining security and compliance across multi-cloud infrastructures. Traditional security management methods often lead to misconfigurations, compliance violations, and increased attack surfaces. To address these risks, cloud security automation using policy-as-code frameworks, such as AWS Config, Azure Policy, and OpenStack Chef Cookbooks, enables organizations to enforce security controls programmatically. This paper evaluates these frameworks' effectiveness in automating security compliance, enforcing Cente
APA, Harvard, Vancouver, ISO, and other styles
26

Owobu, Wilfred Oseremen, Olumese Anthony Abieba, Peter Gbenle, et al. "Conceptual Framework for Deploying Data Loss Prevention and Cloud Access Controls in Multi-Layered Security Environments." International Journal of Multidisciplinary Research and Growth Evaluation 3, no. 1 (2022): 850–60. https://doi.org/10.54660/.ijmrge.2022.3.1.850-860.

Full text
Abstract:
The rapid adoption of cloud computing and digital transformation has introduced new security challenges, particularly in protecting sensitive data from unauthorized access, data breaches, and insider threats. Organizations must implement robust security frameworks to safeguard data integrity and confidentiality while ensuring compliance with regulatory requirements such as GDPR, HIPAA, and NIST standards. This presents a conceptual framework for deploying Data Loss Prevention (DLP) and Cloud Access Controls in a multi-layered security environment, addressing the evolving cybersecurity landscap
APA, Harvard, Vancouver, ISO, and other styles
27

Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.

Full text
Abstract:
The rapid evolution of cloud platform engineering has revolutionized secure deployment automation, continuous integration, and continuous deployment (CI/CD) practices, while introducing innovative risk mitigation strategies. The integration of Artificial Intelligence into cloud operations has transformed threat detection capabilities and automated security response mechanisms across distributed environments. Advanced automation frameworks have enhanced infrastructure management through self-healing mechanisms and intelligent configuration controls. Cloud-native security architectures implement
APA, Harvard, Vancouver, ISO, and other styles
28

Kiran Kumar Suram. "Innovations in Infrastructure Automation: Advancing IAM in Cloud Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 255–63. https://doi.org/10.32628/cseit25111223.

Full text
Abstract:
This article explores recent innovations in infrastructure automation that enhance cloud security and Identity and Access Management (IAM) systems. The focus lies on adopting AI-driven IAM solutions that enable dynamic role evolution and access management, along with integrating advanced technologies for automated incident response. The implementation significantly improves threat detection, response times, and security posture. The article encompasses the emergence of serverless IAM architectures, their benefits in access control, and their contribution to data privacy. Through examining inte
APA, Harvard, Vancouver, ISO, and other styles
29

Adebola, Folorunso, Mohammed Viqaruddin, Wada Ifeoluwa, and Samuel Bunmi. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. https://doi.org/10.5281/zenodo.15063305.

Full text
Abstract:
The increasing frequency and sophistication of cyber threats have made organizations need to adopt robust cybersecurity frameworks. ISO security standards, particularly the ISO/IEC 27000 series, play a critical role in enhancing organizations' cybersecurity posture worldwide. These standards provide a systematic approach to managing sensitive information, ensuring its confidentiality, integrity, and availability. ISO/IEC 27001, which focuses on establishing an Information Security Management System (ISMS), is widely recognized for its ability to help organizations identify, manage, and mitigat
APA, Harvard, Vancouver, ISO, and other styles
30

Salama, Ramiz, and Fadi Al-Turjman. "Addressing Cybersecurity Vulnerabilities with Cloud Security." NEU Journal for Artificial Intelligence and Internet of Things 4, no. 1 (2025): 86–95. https://doi.org/10.32955/neuaiit202541965.

Full text
Abstract:
In today's increasingly digital environment, the rapid adoption of cloud technology has transformed data storage, access, and management. However, this transition has created new cyber security weaknesses, exposing private information to prospective assaults and invasions. This study looks at the major security concerns that cloud-based enterprises must deal with, including insider threats, sophisticated persistent attacks, data breaches, and misconfiguration difficulties. We explore how these vulnerabilities develop, how they affect an organization's security posture, and the unique character
APA, Harvard, Vancouver, ISO, and other styles
31

Dagar, Ritu, Dr Shilpa Mahajan, and Dr Rohit Vashisht. "Enhancing Data Security in Cloud Computing Using Blockchain." Irish Interdisciplinary Journal of Science & Research 08, no. 01 (2024): 66–79. http://dx.doi.org/10.46759/iijsr.2024.8107.

Full text
Abstract:
As cloud computing continues to proliferate, ensuring data security within cloud environments becomes increasingly critical. This paper explores the integration of blockchain technology as a means to enhance data security in cloud computing. Blockchain, with its decentralized and immutable ledger system, offers unique capabilities that address key security challenges such as data privacy, integrity, identity management, and compliance. Through a comprehensive analysis of blockchain's potential applications and integration strategies, this paper provides insights into how blockchain can bolster
APA, Harvard, Vancouver, ISO, and other styles
32

Rathore, Anupam. "A Security Assessment Framework Based on Cloud Technology: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 1955–59. http://dx.doi.org/10.22214/ijraset.2024.63424.

Full text
Abstract:
Abstract: Because cloud technology offers previously unheard-of scalability and flexibility, it has become indispensable to modern computing. But maintaining cloud systems' security continues to be a major concern. An extensive examination of security assessment frame-works customized for cloud computing is provided in this review paper. It looks at current approaches, points out their advantages and disadvantages, and suggests a fresh framework that incorporates risk management ideas. The suggested framework ensures scalability and adaptation to different deployment methods while emphasizing
APA, Harvard, Vancouver, ISO, and other styles
33

Vats, Rahul. "Zero Trust Security Models for CloudBased Enterprise Applications." International Journal of Advances in Engineering and Management 7, no. 4 (2025): 147–66. https://doi.org/10.35629/5252-0704147166.

Full text
Abstract:
Zero Trust Security Models have emerged as essential frameworks for enterprises migrating to cloud environments, addressing the limitations of traditional perimeter-based approaches. As remote workforces expand and multi-cloud architectures proliferate, organizations face increasing security challenges that require continuous authentication and verification. This article introduces a Zero Trust Cloud Security Framework (ZTSF) that integrates softwaredefined perimeters, AI-powered threat detection, and secure identity management to protect enterprise cloud workloads. Through case studies from f
APA, Harvard, Vancouver, ISO, and other styles
34

Arif, Tuba, Byunghyun Jo, and Jong Hyuk Park. "A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats." Sensors 25, no. 8 (2025): 2350. https://doi.org/10.3390/s25082350.

Full text
Abstract:
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native environments. Specifically, a variety of solutions are covered, such as runtime protection platforms for real-time threat detection and responses, cloud-native endpoint security solutions for ensuring trust and resilience in dynamic contexts, and service
APA, Harvard, Vancouver, ISO, and other styles
35

Kaleru, Anjan Kumar. "Identity Governance: Essential Strategies and Best Practices for Cloud Environments." European Journal of Computer Science and Information Technology 13, no. 13 (2025): 14–22. https://doi.org/10.37745/ejcsit.2013/vol13n131422.

Full text
Abstract:
Cloud adoption is fundamentally transforming traditional identity governance practices, necessitating enhanced frameworks specifically designed for cloud-based environments. Effective identity governance for cloud environments requires clear policy definitions, automated provisioning and deprovisioning processes, regular entitlement reviews, and continuous monitoring capabilities. The implementation of automated governance processes enables organizations to quickly identify and remediate unauthorized access or compliance anomalies while significantly reducing manual administrative workloads. B
APA, Harvard, Vancouver, ISO, and other styles
36

Swapna Reddy Anugu. "AI in Financial Services: Revolutionizing Fraud Detection and Risk Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 208–17. https://doi.org/10.32628/cseit25112354.

Full text
Abstract:
This comprehensive article examines the transformative impact of artificial intelligence and machine learning technologies on financial institutions' approaches to fraud detection, risk management, and regulatory compliance. The article explores how cloud-powered AI solutions are revolutionizing security measures and operational efficiency in the financial sector. From advanced fraud detection systems to automated regulatory compliance, the article demonstrates how AI-driven solutions are enabling financial organizations to enhance their security posture while streamlining operations. The arti
APA, Harvard, Vancouver, ISO, and other styles
37

RAJESH RAJAMOHANAN NAIR. "The role of encryption key management in hybrid cloud environments." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 1235–43. https://doi.org/10.30574/wjaets.2025.15.2.0645.

Full text
Abstract:
This article examines the critical role of encryption key management in hybrid cloud environments, where enterprises must secure data across both on-premises infrastructure and multiple cloud service providers. As organizations increasingly adopt hybrid architectures to balance flexibility, performance, and cost-efficiency, they face growing complexity in securing sensitive data across disparate environments. This study hypothesizes that centralized encryption key management significantly reduces data exposure risk in hybrid cloud environments. It demonstrates that organizations implementing c
APA, Harvard, Vancouver, ISO, and other styles
38

Naga Swetha Kattula. "Next-Gen Cloud: The future of secure and seamless cross-platform integrations." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1302–8. https://doi.org/10.30574/wjarr.2025.26.1.1090.

Full text
Abstract:
The rapid evolution of enterprise cloud computing has necessitated innovative architectural approaches to address the complexities of multi-cloud environments while maintaining robust security. This article explores transformative technologies reshaping cross-platform integrations in modern cloud ecosystems. The convergence of AI-driven API management platforms has revolutionized the governance and security aspects of cloud integration, enabling organizations to achieve unprecedented operational efficiencies. Confidential Computing represents a paradigm shift in data security, utilizing hardwa
APA, Harvard, Vancouver, ISO, and other styles
39

Anjan Kumar Kaleru. "Converged IAM: Transforming Enterprise Identity Management in the Cloud Era." Journal of Computer Science and Technology Studies 7, no. 2 (2025): 598–603. https://doi.org/10.32996/jcsts.2025.7.2.64.

Full text
Abstract:
This article examines the transformation of Identity and Access Management (IAM) in the context of enterprise digital transformation and cloud adoption. It explores how traditional siloed approaches to IAM have created significant operational challenges and security vulnerabilities, leading organizations to adopt converged IAM solutions. The article investigates the benefits of integrating Access Management, Identity Governance and Administration, and Privileged Access Management into unified platforms. Through analysis of implementation cases across various industries, with particular focus o
APA, Harvard, Vancouver, ISO, and other styles
40

Sunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Revolutionizing data center security: Conceptualizing a unified security framework for hybrid and multi-cloud data centers." Open Access Research Journal of Science and Technology 5, no. 2 (2022): 086–76. https://doi.org/10.53022/oarjst.2022.5.2.0065.

Full text
Abstract:
The rapid shift towards hybrid and multi-cloud environments has introduced significant security challenges for data centers, as traditional security models struggle to meet the demands of modern infrastructures. This review conceptualizes a unified security framework aimed at revolutionizing data center security in the context of hybrid and multi-cloud architectures. The proposed framework integrates on-premise and cloud security controls into a cohesive, scalable solution that addresses the complexities of modern data centers, ensuring robust protection against increasingly sophisticated cybe
APA, Harvard, Vancouver, ISO, and other styles
41

Jain, Prerna, Neha Thakre, Shakshi Barman, and Mansi Yadav. "Proactive Security Measures in Cloud Computing: Enhancing Data Protection and Trust." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 07 (2023): 9930–35. http://dx.doi.org/10.15680/ijircce.2024.1207105.

Full text
Abstract:
Cloud computing has revolutionized the handling of data storage, management, and processing for organizations, offering unparalleled scalability, flexibility, and cost-efficiency. With the increasing shift of businesses and individuals to cloud-based solutions, the importance of robust security measures has become more pronounced. However, the adoption of cloud computing also introduces unique security challenges, necessitating proactive strategies to safeguard sensitive data and maintain trust in cloud services. The inherent characteristics of cloud environments— shared resources, remote acce
APA, Harvard, Vancouver, ISO, and other styles
42

Alugoju, Narasimha Rao. "Data Protection in the Cloud: Ensuring Security and Compliance for Organizational Data." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 1590–96. https://doi.org/10.22214/ijraset.2024.66087.

Full text
Abstract:
The widespread adoption of cloud computing has transformed the way organizations store, process, and access data, offering unparalleled scalability and flexibility. However, this shift to cloud-based infrastructures has also introduced new vulnerabilities and security challenges. Cyberattacks targeting cloud environments, including data breaches, unauthorized access, and misconfigurations, threaten the confidentiality, integrity, and availability of sensitive information. This article examines the critical strategies and technologies necessary to safeguard organizational data in the cloud, foc
APA, Harvard, Vancouver, ISO, and other styles
43

Matseniuk, Y., and A. Partyka. "THE CONCEPT OF AUTOMATED COMPLIANCE VERIFICATION AS THE FOUNDATION OF A FUNDAMENTAL CLOUD SECURITY MODEL." Computer systems and network 6, no. 1 (2024): 108–23. http://dx.doi.org/10.23939/csn2024.01.108.

Full text
Abstract:
The primary objective of this research is to develop an advanced automated method for configuring and managing public cloud accounts and subscriptions on prominent platforms such as AWS GCP and Azure. This method involves the application of standardized configurations to ensure optimal performance and security compliance. A significant component of this methodology is the intermittent scanning of the infrastructure of these cloud accounts and subscriptions. This scanning is meticulously designed to identify and address any deviations or non-compliance issues with globally recognized security s
APA, Harvard, Vancouver, ISO, and other styles
44

Srikanth Dandolu. "Infrastructure as Code for Cloud-Native Data Platforms: Automation and Best Practices." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 451–88. https://doi.org/10.32996/jcsts.2025.7.5.55.

Full text
Abstract:
Infrastructure as Code (IaC) has revolutionized the management of cloud-native data platforms by transforming manual processes into programmatic declarations. This transformation enables organizations to achieve remarkable improvements in deployment efficiency, security posture, and operational reliability. Through the implementation of modular architecture, robust state management, and comprehensive security controls, enterprises can effectively automate their infrastructure while maintaining consistency and compliance. The integration of Terraform with Snowflake resources demonstrates substa
APA, Harvard, Vancouver, ISO, and other styles
45

Sreenivasa, Rao Sola. "Security Roles and Privileges in Oracle Cloud ERP: Key Strategies for Secure Access Management." International Journal of Leading Research Publication 3, no. 7 (2022): 1–18. https://doi.org/10.5281/zenodo.15259078.

Full text
Abstract:
Increased utilization of cloud-based solutions has redefined enterprise resource planning (ERP) systems, with Oracle Cloud ERP among the leading platforms. As organizations move core business functions to the cloud, secure access management to these systems gains significance. This paper addresses the significance of security roles and privileges in Oracle Cloud ERP, emphasizing crucial strategies for secure access management. Here, it examines the processes Oracle Cloud ERP employs to assign, monitor, and audit user access to safe data and minimize threats. Through the examination of role-bas
APA, Harvard, Vancouver, ISO, and other styles
46

Ismail, Assoujaa, and Ezzouak Siham. "Enhancing Cloud Security: Strategies and Technologies for Protecting Data in Cloud Environments." International Journal of Applied Mathematics, Computational Science and Systems Engineering 6 (November 19, 2024): 224–29. http://dx.doi.org/10.37394/232026.2024.6.18.

Full text
Abstract:
With the rapid adoption of cloud computing, ensuring the security of data has become a paramount concern for organizations of all sizes. This paper explores various strategies and technologies for protecting data in cloud environments. Encryption emerges as a fundamental technique for safeguarding data both at rest and in transit, with block ciphers and stream ciphers offering robust encryption methods. Additionally, hash functions play a critical role in verifying data integrity and ensuring secure data storage. We delve into the implementation of these techniques in cloud environments, highl
APA, Harvard, Vancouver, ISO, and other styles
47

Vivek Aby Pothen. "AI-Powered Access Governance: Automating Risk-Based Identity in Enterprise Cloud." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 416–25. https://doi.org/10.32996/jcsts.2025.7.3.48.

Full text
Abstract:
Identity management stands at the forefront of modern cybersecurity challenges, particularly as organizations navigate increasingly complex cloud environments. This article explores the implementation of artificial intelligence and machine learning technologies to revolutionize access governance in enterprise cloud settings, with a specific focus on telecommunications domains. The article examines how advanced analytics can transform traditional identity management approaches through behavioral analysis, automated provisioning, and dynamic access controls. By investigating the integration capa
APA, Harvard, Vancouver, ISO, and other styles
48

Arun Kumar Akuthota. "Identity and access governance in the cloud: Leveraging SAP BTP, AI, and IAM." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 918–26. https://doi.org/10.30574/wjarr.2025.26.1.1088.

Full text
Abstract:
In the era of digital transformation, organizations face mounting challenges in managing identity and access governance across cloud environments. This article examines how the integration of SAP Business Technology Platform (BTP), artificial intelligence, and Identity & Access Management (IAM) solutions creates a comprehensive framework for addressing these challenges. The article explores SAP's approach to identity governance through enhanced authentication services, intelligent provisioning capabilities, and AI-driven security management. The article demonstrates how this integrated app
APA, Harvard, Vancouver, ISO, and other styles
49

Shravan Kumar Amjala. "AI-Powered Cloud Automation: A Scholarly Perspective." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2664–72. https://doi.org/10.30574/wjaets.2025.15.2.0845.

Full text
Abstract:
This article explores the transformative integration of artificial intelligence and machine learning into cloud infrastructure, creating a paradigm shift in enterprise IT operations. As organizations increasingly migrate to distributed cloud environments, the inherent complexity demands sophisticated automation beyond traditional manual capabilities. AI-powered cloud automation addresses these challenges through intelligent orchestration, predictive resource scaling, and autonomous optimization mechanisms. The synergistic relationship between AI and cloud technologies enables self-optimizing s
APA, Harvard, Vancouver, ISO, and other styles
50

Singha, Anjani Kumar, Shakti Kundu, Harsh Pratap Singh, Lokendra Singh Songare, and Pradeep Kumar Tiwari. "Measuring network security in the cloud : A roadmap for proactive defense." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 889–902. http://dx.doi.org/10.47974/jdmsc-1964.

Full text
Abstract:
An exhaustive examination and evaluation of hierarchy network security measuring and optimal active defense in the context of cloud computing is provided in this paper. After collecting all the cloud platform’s security-related data obtained via evaluation, the pertinent security data is summarized and analyzed to create the cloud platform’s safety record index. This index serves as a benchmark for the cloud platform administrators to evaluate the security vulnerabilities associated with their cloud platform. It offers cloud platform administrators a standard against which to assess the securi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!