To see the other types of publications on this topic, follow the link: Multi-cloud architecture.

Journal articles on the topic 'Multi-cloud architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-cloud architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hamdan, Norazian M., Novia Admodisastro, Hafeez Bin Osman, and Muhammad Sufri Bin Muhammad. "Semantic Interoperability in Multi-Cloud Platforms: A Reference Architecture Utilizing an Ontology-Based Approach." International Journal on Advanced Science, Engineering and Information Technology 14, no. 6 (2024): 1967–75. https://doi.org/10.18517/ijaseit.14.6.19861.

Full text
Abstract:
The rapid expansion of cloud computing has necessitated the development of multi-cloud strategies, which leverage the strengths of multiple cloud service providers to mitigate risks such as vendor lock-in and enhance performance and reliability. Nevertheless, semantic interoperability remains a critical challenge in multi-cloud platforms, where diverse cloud services need to communicate and function seamlessly. Current solutions lack a unified semantic-based representation within reference architectures in multi-cloud platforms and mainly focus on the independent interoperability of a service model, i.e., SaaS, PaaS, and IaaS. This study addresses the critical issue of semantic interoperability in multi-cloud platforms, where the heterogeneity of proprietary cloud solutions impedes seamless integration and communication. Thus, we proposed a reference architecture utilizing an ontology-based approach to facilitate semantic interoperability across diverse cloud platforms. The reference architecture is based on five semantic interoperability requirements identified in our previous study. This paper presents the design and development of a reference architecture that includes high-level and low-level components supported by a taxonomy of semantic interoperability in multi-cloud platforms. Expected outcomes of this study include a standardized framework using an ontology-based approach for semantic mapping and integration of cloud services, which will significantly enhance interoperability and efficiency in multi-cloud platforms. The significance of this research lies in its potential to advance the state of knowledge and practice in multi-cloud computing, enabling more robust and flexible cloud service ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
3

Nikhil, Bhagat. "Optimizing Performance, Cost-Efficiency, and Flexibility through Hybrid Multi-Cloud Architectures." Journal of Scientific and Engineering Research 11, no. 4 (2024): 372–79. https://doi.org/10.5281/zenodo.14273093.

Full text
Abstract:
Cloud Computing is the foundation of every modern company that is scalable, adaptable and economical. Hybrid multi-cloud environments, which combine private clouds, public clouds, and multiple cloud providers, represent the next generation for scaling cloud infrastructures. Hybrid cloud architecture lets organizations reap the security and control benefits of a private cloud while also taking advantage of the scalability and cost efficiency of a public cloud. Meanwhile, multi-cloud models avoid vendor lock-in, provide risk mitigation, and enable organizations to choose the best options from multiple providers. Hybrid and multi-cloud solutions together offer an integrated cloud architecture that maximizes usage, performance, and resilience. The paper delves into the advantages of hybrid and multi-cloud environments, including agility, cost efficiency and increased security. The paper also touches on organizational design considerations such as workload assignment, interoperability, security, and vendor selection. The paper provides guidelines for implementing hybrid multi-cloud environments where orchestration tools and automation play a vital role to facilitate the operations. Even though Hybrid multi-cloud architectures provide greater flexibility, they must be strategically designed, implemented and managed. By modernizing these environments, businesses can enhance performance, profitability, and agility, better preparing them to thrive in today’s competitive market.
APA, Harvard, Vancouver, ISO, and other styles
4

Omoniyi Babatunde Johnson, Jeremiah Olamijuwon, Emmanuel Cadet, Olajide Soji Osundare, and Zein Samira. "Designing multi-cloud architecture models for enterprise scalability and cost reduction." Open Access Research Journal of Engineering and Technology 7, no. 2 (2024): 101–13. http://dx.doi.org/10.53022/oarjet.2024.7.2.0061.

Full text
Abstract:
Designing multi-cloud architecture models has become a critical strategy for enterprises seeking scalability and cost reduction in their cloud operations. Multi-cloud environments, which involve the use of multiple cloud service providers (CSPs), offer businesses the flexibility to optimize performance, improve resource allocation, and mitigate risks such as downtime, vendor lock-in, and service interruptions. This review explores the design principles and best practices for creating multi-cloud architectures that enhance enterprise scalability while simultaneously driving cost efficiencies. By leveraging the strengths of various CSPs such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud businesses can tailor their infrastructure to meet specific workload requirements and capitalize on competitive pricing models, ensuring better resource utilization and reducing the risk of under or over-provisioning. Scalability in multi-cloud architectures is achieved by implementing load balancing, auto-scaling, and failover mechanisms across multiple platforms. These systems can dynamically allocate resources in response to fluctuating demand, ensuring high availability and optimized performance. Additionally, the review discusses the key technologies that enable multi-cloud management, such as cloud management platforms (CMPs), containerization, and orchestration tools like Kubernetes, which help streamline operations and simplify the complex task of managing resources across disparate cloud environments. Cost reduction in multi-cloud is achieved by optimizing resource usage, selecting the right pricing models (e.g., on-demand, reserved, or spot pricing), and automating scaling and resource management. The review also highlights the importance of adopting security best practices to manage data privacy and compliance across multiple clouds. Finally, the review presents real-world case studies that demonstrate the tangible benefits of multi-cloud strategies, illustrating how enterprises can scale operations effectively while reducing infrastructure costs. This research underscores the transformative potential of multi-cloud architectures in modern enterprise environments, emphasizing their role in achieving business agility, cost optimization, and operational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
5

Munde, Amit V., and Dr Pranjali P. Deshmukh. "Multi Cloud Data Hosting with SIC Architecture." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1830–33. http://dx.doi.org/10.22214/ijraset.2022.40999.

Full text
Abstract:
Abstract: Data hosting on cloud decreases cost of IT maintenance and data reliability get enhance. Nowadays, customers can store their data on single cloud, which has some drawbacks. First is vendor lock in problem and second is security on cloud. The solution to this problem is to store the data on different cloud server without redundancy using encryption algorithm. Customers do not want to lose their sensitive data on cloud. Another issue of cloud computing is data thievery should be overcome to supply higher service. Multi-cloud environment has ability to scale back security risks. To avoid security risk we offer framework. Keywords: Cloud computing, cloud storage, data hosting, data intrusion, multi-cloud, single cloud.
APA, Harvard, Vancouver, ISO, and other styles
6

Jamshidi, Pooyan, Claus Pahl, and Nabor C. Mendonça. "Pattern-based multi-cloud architecture migration." Software: Practice and Experience 47, no. 9 (2016): 1159–84. http://dx.doi.org/10.1002/spe.2442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baladari, Venkata. "Cloud Resiliency Engineering: Best Practices for Ensuring High Availability in Multi-Cloud Architectures." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 2062–67. https://doi.org/10.21275/SR220610115023.

Full text
Abstract:
Ensuring cloud resiliency through engineering is essential for maintaining high availability, fault tolerance, and disaster recovery within contemporary cloud infrastructures. As more businesses move towards multi - cloud environments, maintaining system reliability and efficiency while also controlling costs takes centre stage. This study delves into optimal strategies for bolstering cloud reliability via automated failover systems, real - time data duplication, load distribution, and self - restoring networks. The analysis focuses on strategies for disaster recovery, cost - effective resource management, and enhancing security resilience to minimize potential risks.The report draws attention to the difficulties involved in integrating multiple cloud systems, maintaining data consistency, and dealing with cyber threats. It also explores the development of new technologies like AI - powered automation, edge computing, and predictive analytics for identifying potential failures. The study offers valuable insights into how to optimally configure cloud infrastructure to achieve the highest levels of efficiency and dependability. Future developments in autonomous cloud systems, quantum encryption, and eco-friendly computing models to enhance cloud robustness. This paper provides a detailed guide for companies seeking to construct reliable cloud infrastructure that maintains operational stability and reduces the frequency of service interruptions.
APA, Harvard, Vancouver, ISO, and other styles
8

Fan, Yi Jie, Zhen Qiao, and Ming Zhong Xiao. "One Cloud: A Secure and Anonymous Multi-Cloud Oblivious Storage Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5591–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5591.

Full text
Abstract:
We present a cross-cloud storage architecture that protects both user’s data and privacy from cloud providers or potential adversaries by leveraging the concept of Oblivious RAM on a logical layer. Our architecture allows users to conceal reading/writing operations and access sequences from clouds in order to prevent the leakage of access patterns, which may be a threat to data security. In addition, an anonymity preserving mechanism applied in our architecture makes it difficult to track users' data or confirm users' identities, which can effectively protect users' privacy. One Cloud, the proof-of-concept prototype of our architecture integrates four major cloud storage services and implements all key techniques we proposed in our architecture. We deploy it in a real-world network environment to analyze and evaluate the performance and the scalability of our architecture.
APA, Harvard, Vancouver, ISO, and other styles
9

Santosh, Pashikanti. "Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework." International Journal of Leading Research Publication 4, no. 9 (2023): 1–4. https://doi.org/10.5281/zenodo.14646896.

Full text
Abstract:
The rise of multi-cloud environments has introduced new complexities in securing distributed systems. Traditional perimeter-based security models no longer suffice, necessitating the adoption of Zero Trust Architecture (ZTA). Zero Trust enforces strict access controls based on identity, device posture, and continuous verification, irrespective of network location. This paper presents a detailed framework for implementing Zero Trust Architecture across multi-cloud environments. It outlines the architectural components, technologies, challenges, and best practices to ensure robust security.
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Woosik, Eun Suk Suh, Woo Young Kwak, and Hoon Han. "Comparative Analysis of 5G Mobile Communication Network Architectures." Applied Sciences 10, no. 7 (2020): 2478. http://dx.doi.org/10.3390/app10072478.

Full text
Abstract:
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access Edge Computing is one of the key technologies of 5G in guaranteeing ultra-low latency aimed to support latency critical services by distributing centralized computing resources to networks edges closer to users. However, due to its high granularity of computing resources, Multi-access Edge Computing has an architectural vulnerability in that it can lead to the overloading of regional computing resources, a phenomenon called regional traffic explosion. This paper proposes an improved communication architecture called Hybrid Cloud Computing, which combines the advantages of both Centralized Cloud Computing and Multi-access Edge Computing. The performance of the proposed network architecture is evaluated by utilizing a discrete-event simulation model. Finally, the results, advantages, and disadvantages of various network architectures are discussed.
APA, Harvard, Vancouver, ISO, and other styles
11

Sachin Kumar. "The Rise of Multi-Cloud Architecture: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2836–43. https://doi.org/10.32628/cseit251112305.

Full text
Abstract:
Multi-cloud architecture has emerged as a transformative approach in modern enterprise computing, fundamentally changing how organizations deploy, manage, and scale their digital infrastructure. This technical article examines the evolution of multi-cloud strategies, exploring the key drivers behind their adoption and the enabling technologies that make them possible. The article investigates the critical role of containerization and orchestration in achieving workload portability, while also analyzing the impact of service discovery, networking solutions, and infrastructure as code practices. The article further explores emerging trends in financial management, networking advancements, and compliance frameworks that are shaping the future of multi-cloud implementations. Through comprehensive analysis, this article demonstrates how multi-cloud architectures enable organizations to enhance operational efficiency, improve security posture, and maintain regulatory compliance while avoiding vendor lock-in.
APA, Harvard, Vancouver, ISO, and other styles
12

Satyanarayan Kanungo and Saumya Sarangi. "Quantum computing integration with multi-cloud architectures: enhancing computational efficiency and security in advanced cloud environments." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 564–74. http://dx.doi.org/10.30574/wjaets.2024.12.2.0319.

Full text
Abstract:
The objective of this research is to explore the integration of quantum computing with multi-cloud architectures, aiming to enhance computational efficiency and security in advanced cloud environments. The study seeks to identify the potential benefits and challenges of incorporating quantum computing capabilities within a multi-cloud framework and to evaluate the impact on performance and security metrics. The research employs a hybrid methodological approach, combining both theoretical analysis and practical implementation. Initially, a detailed literature review is conducted to understand the current state of quantum computing and multi-cloud architectures. This is followed by the design and development of an integration framework that leverages quantum computing technologies in a multi-cloud environment. Key steps include developing a multi-cloud architecture that integrates quantum computing resources alongside classical computing resources, deploying quantum algorithms and protocols within the multi-cloud setup, implementing advanced security measures to protect data and computational processes, using a set of predefined metrics to evaluate computational efficiency and security, and employing statistical tools and techniques to analyze the collected data and draw meaningful insights. The integration of quantum computing with multi-cloud architectures resulted in significant improvements in computational efficiency, particularly in tasks that are traditionally resource-intensive. Key findings include enhanced computational speed, where quantum algorithms demonstrated superior performance in solving complex problems compared to classical algorithms, optimized resource utilization through dynamic allocation of quantum and classical resources leading to cost efficiency, improved security with quantum-enhanced protocols providing robust protection against cyber threats, and high scalability of the integrated architecture to accommodate increasing computational demands without compromising performance. The research concludes that integrating quantum computing with multi-cloud architectures offers substantial benefits in terms of computational efficiency and security. The findings indicate that such integration can revolutionize cloud computing, providing a powerful platform for handling complex computations and enhancing data security. However, the study also highlights several challenges, including the need for specialized hardware, the complexity of integration, and the necessity for ongoing research to fully harness the potential of quantum computing in cloud environments. Future research should focus on addressing these challenges and exploring further applications of quantum computing in various cloud-based scenarios.
APA, Harvard, Vancouver, ISO, and other styles
13

Fauzan Prasetyo Eka Putra, Noviyani Dwi Saputri, Fathur Rosi, and Rohilia Loati. "Optimalisasi Infrastruktur Cloud Networking melalui Integrasi SDN, NFV, dan Multi-Cloud." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 5, no. 1 (2025): 118–25. https://doi.org/10.55606/jitek.v5i1.6099.

Full text
Abstract:
Cloud networking is a crucial element in the management of modern computer network infrastructure because it can increase service efficiency and flexibility. However, the successful implementation of cloud networking is highly dependent on the network architecture that supports optimal performance. This research conducted a literature study to review the development of computer network architectures that facilitate the implementation of cloud networking, by reviewing more than 50 recent publications related to software-defined networking (SDN), network function virtualization (NFV), and hybrid and multi-cloud models. The review shows that the integration of SDN and NFV is a major trend for designing adaptive and cost-effective network architectures, while the combination of hybrid and multi-cloud models improves scalability and redundancy. In conclusion, the adoption of SDN-NFV technology and mixed cloud deployment strategies have proven effective in optimizing the performance and management of cloud-based networks.
APA, Harvard, Vancouver, ISO, and other styles
14

S. Raj, Dr Jennifer. "EFFICIENT INFORMATION MAINTENANCE USING COMPUTATIONAL INTELLIGENCE IN THE MULTI-CLOUD ARCHITECTURE." Journal of Soft Computing Paradigm 2019, no. 2 (2019): 113–24. http://dx.doi.org/10.36548/jscp.2019.2.006.

Full text
Abstract:
The multi cloud architecture improvises the constancy of the system associated with the cloud computing as they offer benefits such as the reducing the severity of the vendor lock in, which is the major impediment to the cloud service adoption. However the information maintenance in the multi cloud architecture is a very tedious and challenging as it inherits multitudes of complexity due to various services rendered, interfaces and technologies used. As storage is the fundamental usage of the cloud computing, the failures in the information maintenance (storage, securing, retrieval) in the traditional cloud computing has led to the development of different techniques that are highly reliable and flexible. The paper also scope in developing one such adaptable and highly secure information maintenance using the Cryptography integrated Computational intelligence (CICI) for application deployment in the multi cloud architecture. The proposed method is validated using the network simulator –Two, to verify the performance augmentation of the multi-cloud architecture in its information maintenance.
APA, Harvard, Vancouver, ISO, and other styles
15

Rishi Kumar Sharma. "Multi-Tenant Architectures in Modern Cloud Computing: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 307–17. https://doi.org/10.32628/cseit25111236.

Full text
Abstract:
This comprehensive article explores the evolution and implementation of multi-tenant architectures in modern cloud computing environments, focusing on their role in Software-as-a-Service solutions. The article examines how these architectures enable efficient resource sharing while maintaining strict data isolation among tenants. This article demonstrates how integrating AI-driven observability frameworks and advanced security mechanisms, such as IAM and KMS, can improve scalability by 70% and reduce operational costs by 60%, offering practical solutions to modern multi-tenant architecture challenges. The article delves into core technical components, including data layer implementation and compute layer architecture, while analyzing advanced security measures and AI-driven observability frameworks. Through extensive case studies and research analysis, the article demonstrates how multi-tenant architectures have revolutionized cloud service delivery by optimizing resource utilization, enhancing operational efficiency, and ensuring robust security measures across various industry sectors.
APA, Harvard, Vancouver, ISO, and other styles
16

Thakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.

Full text
Abstract:
With the growing reliance on cloud computing for storing and managing data, providing security and performance for cloud storage systems has become very important and multicloud solutions offers both. Current cloud architectures suffer from scalability, security, and efficiency issues in distributed cloud systems. In this paper, we introduce a ChaCha20-encryption, a fast stream cipher and Blake3, an adaptive cryptographic hash function, and dynamic chunk allocation to an existing architecture that progressively improves data confidentiality, integrity, and redundancy. The experiment focuses on the system's performance relative to Four Tier Secure Cloud Storage Architecture, which utilizes AES, MD5 hashing, and static chunk allocation strategies for data storage. To ensure a balance between performance while offering the security this architecture implements ChaCha20 which is fast and resistant to side-channel attack – making it ideal for modern multi cloud deployments. Experiments show that this new architecture is faster, more lightweight and adaptable than existing model.
APA, Harvard, Vancouver, ISO, and other styles
17

Sulochana, M., and Ojaswani Dubey. "Preserving Data Confidentiality Using Multi-cloud Architecture." Procedia Computer Science 50 (2015): 357–62. http://dx.doi.org/10.1016/j.procs.2015.04.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Guleria, Pratiyush. "Data Access Layer: A Programming Paradigm on Cloud." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 3 (2013): 2341–45. http://dx.doi.org/10.24297/ijct.v11i3.1164.

Full text
Abstract:
Database is important for any application and critical part of private and public cloud platforms. For compatibility with cloud computing we can follow architectures like three tier architecture in .Net Technologies such that database layer should be separate from user and business logic layers. There are some other issues like following ACID properties in databases, providing dynamic scalability by using Shared-disk Architecture and efficient multi-tenancy, elastic scalability, and database privacy.
APA, Harvard, Vancouver, ISO, and other styles
19

Anish Agarwal. "Edge Computing and Fog Architecture: Reshaping Distributed System Boundaries." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 827–38. https://doi.org/10.30574/wjaets.2025.15.3.1004.

Full text
Abstract:
Edge computing and fog architecture represent a paradigm shift in distributed systems, fundamentally transforming traditional boundaries by pushing computation and data management closer to data origins. As connected devices proliferate and generate unprecedented data volumes, these architectural approaches address inherent limitations in cloud-centric models including latency constraints, bandwidth bottlenecks, and privacy concerns. The multi-tiered edge-fog-cloud continuum creates a gradient of complementary computing resources that enables more flexible and context-aware resource allocation. This architectural evolution necessitates rethinking core distributed systems principles through specialized technologies including lightweight consensus protocols, adaptive synchronization mechanisms, and state management approaches designed for variable connectivity environments. Edge-native storage solutions balance local autonomy with global consistency through specialized data models and partitioning strategies optimized for resource-constrained devices. Real-world implementations across industrial IoT, retail analytics, telecommunications infrastructure, and smart cities demonstrate tangible improvements in responsiveness, efficiency, privacy protection, and system resilience while enabling entirely new application categories previously infeasible under cloud-only architectures.
APA, Harvard, Vancouver, ISO, and other styles
20

Mukta Sharma. "Optimizing Cloud Computing Performance: A Comparative Study of Hybrid and Multi-Cloud Architectures." Journal of Sustainable Solutions 1, no. 4 (2024): 154–57. https://doi.org/10.36676/j.sust.sol.v1.i4.47.

Full text
Abstract:
The scalability, flexibility, and cost-efficiency offered by cloud computing have completely transformed the way organisations and enterprises handle their IT infrastructure. There has been a lot of buzz around hybrid and multi-cloud architectures recently due to the rising demand for efficient and dependable cloud services. To prevent vendor lock-in and increase redundancy, hybrid cloud architectures mix on-premises infrastructure with public and private cloud environments, while multi-cloud makes use of numerous cloud service providers. The performance optimisation methodologies of hybrid and multi-cloud systems are the main subject of this paper's comparative investigation. Using metrics like efficiency, adaptability, security, scalability, and performance, we compare and contrast the two designs and highlight their respective benefits and drawbacks. We also investigate and assess the effects of numerous optimisation methods on the system's overall performance, such as load balancing, resource allocation, and network performance management. The study's overarching goal is to help businesses optimise their cloud computing strategies by illuminating the factors that should be considered when choosing an architecture.
APA, Harvard, Vancouver, ISO, and other styles
21

Manne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 7, no. 3 (2025): 74–82. https://doi.org/10.47941/ijce.2753.

Full text
Abstract:
Purpose: The purpose of this study is to examine the implementation of Zero Trust Architecture (ZTA) within multi-cloud environments, where traditional perimeter-based security models are increasingly inadequate. The paper aims to identify and address the unique security challenges posed by multi-cloud infrastructures, such as identity and access management (IAM), policy enforcement, network segmentation, and continuous monitoring. Methodology: The research analyzes established industry frameworks, notably NIST Special Publication 800-207, to provide a theoretical foundation for ZTA. It explores practical implementation strategies by evaluating real-world case studies and assessing technologies such as AI-driven threat detection, identity federation, and software-defined perimeters. Comparative analysis of cloud service provider tools and standardization techniques is also conducted to identify best practices for cross-cloud security. Findings: The study finds that implementing ZTA in multi-cloud environments significantly enhances security postures by minimizing attack surfaces and improving regulatory compliance. Effective integration of AI, federated identity solutions, and cloud-native security tools enables continuous verification and least privilege access control. Unique Contribution to Theory, Practice and Policy: The research concludes that while ZTA presents interoperability and policy enforcement challenges, these can be mitigated through standardized frameworks and automation, making ZTA a viable model for modern cloud security.
APA, Harvard, Vancouver, ISO, and other styles
22

Manne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 4, no. 3 (2023): 1–9. https://doi.org/10.47941/ijce.2754.

Full text
Abstract:
Purpose: The purpose of this study is to examine the implementation of Zero Trust Architecture (ZTA) within multi-cloud environments, where traditional perimeter-based security models are increasingly inadequate. The paper aims to identify and address the unique security challenges posed by multi-cloud infrastructures, such as identity and access management (IAM), policy enforcement, network segmentation, and continuous monitoring. Methodology: The research analyzes established industry frameworks, notably NIST Special Publication 800-207, to provide a theoretical foundation for ZTA. It explores practical implementation strategies by evaluating real-world case studies and assessing technologies such as AI-driven threat detection, identity federation, and software-defined perimeters. Comparative analysis of cloud service provider tools and standardization techniques is also conducted to identify best practices for cross-cloud security. Findings: The study finds that implementing ZTA in multi-cloud environments significantly enhances security postures by minimizing attack surfaces and improving regulatory compliance. Effective integration of AI, federated identity solutions, and cloud-native security tools enables continuous verification and least privilege access control. Unique Contribution to Theory, Practice and Policy: The research concludes that while ZTA presents interoperability and policy enforcement challenges, these can be mitigated through standardized frameworks and automation, making ZTA a viable model for modern cloud security.
APA, Harvard, Vancouver, ISO, and other styles
23

Mbongue, Joel Mandebi, Danielle Tchuinkou Kwadjo, Alex Shuping, and Christophe Bobda. "Deploying Multi-tenant FPGAs within Linux-based Cloud Infrastructure." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (2022): 1–31. http://dx.doi.org/10.1145/3474058.

Full text
Abstract:
Cloud deployments now increasingly exploit Field-Programmable Gate Array (FPGA) accelerators as part of virtual instances. While cloud FPGAs are still essentially single-tenant, the growing demand for efficient hardware acceleration paves the way to FPGA multi-tenancy. It then becomes necessary to explore architectures, design flows, and resource management features that aim at exposing multi-tenant FPGAs to the cloud users. In this article, we discuss a hardware/software architecture that supports provisioning space-shared FPGAs in Kernel-based Virtual Machine (KVM) clouds. The proposed hardware/software architecture introduces an FPGA organization that improves hardware consolidation and support hardware elasticity with minimal data movement overhead. It also relies on VirtIO to decrease communication latency between hardware and software domains. Prototyping the proposed architecture with a Virtex UltraScale+ FPGA demonstrated near specification maximum frequency for on-chip data movement and high throughput in virtual instance access to hardware accelerators. We demonstrate similar performance compared to single-tenant deployment while increasing FPGA utilization, which is one of the goals of virtualization. Overall, our FPGA design achieved about 2× higher maximum frequency than the state of the art and a bandwidth reaching up to 28 Gbps on 32-bit data width.
APA, Harvard, Vancouver, ISO, and other styles
24

Chimakurthi, Venkata Naga Satya Surendra. "The Challenge of Achieving Zero Trust Remote Access in Multi-Cloud Environment." ABC Journal of Advanced Research 9, no. 2 (2020): 89–102. http://dx.doi.org/10.18034/abcjar.v9i2.608.

Full text
Abstract:
Zero-trust security models and architectures have recently increased in adoption due to several variables, such as the widespread use of off-premises cloud technologies, variety in IT devices, and diffusion in the Internet of Things (IoT). Users, devices, apps, and networks are all assumed to be untrustworthy in this approach, which is built on the idea of various tiers of Trust and authentication. Cybersecurity paradigms are developing, and the term "zero trust" describes the shift from static network perimeters to protecting people, things, and resources. Economic and enterprise architecture and processes can be designed using zero trust principles. In the idea of zero Trust, assets or user accounts are thought to have no implicit confidence because of their physical or network location (Internet vs local networks) or asset ownership (enterprise or personally owned). Authentication and authorization must be conducted before a connection to an organizational resource can be established. There are many different types of Cloud, including several public, private, hybrid, and on-premises. For data centers, a multi-cloud deployment strategy includes many different public cloud service providers instead of relying on a private cloud or on-premises architecture. Hybrid multi-cloud is a multi-cloud implementation that incorporates all public and private clouds and on-premises technology. This paper discusses the zero-trust security model for multi-cloud environments and applications and the obstacles to implementing it.
APA, Harvard, Vancouver, ISO, and other styles
25

Researcher. "MODERNIZING LEGACY BIGDATA SYSTEMS: A CLOUD-NATIVE MIGRATION FRAMEWORK AND CASE STUDIES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 1409–18. https://doi.org/10.5281/zenodo.14501045.

Full text
Abstract:
This comprehensive article examines the transformation of legacy big data systems to cloud-native architectures, focusing on migration strategies, implementation frameworks, and real-world case studies. The article investigates the evolution of big data architectures across three generations, from traditional data warehouses to modern cloud-native solutions, highlighting the critical factors driving modernization initiatives. The article analyzes cloud-native architecture principles, high-availability strategies, and migration frameworks while presenting detailed case studies from industry leaders. Through systematic analysis of architectural design principles, testing strategies, and performance optimization techniques, the article demonstrates the significant benefits of cloud modernization in terms of scalability, cost efficiency, and operational effectiveness. The article encompasses various aspects of modernization, including multi-availability zone deployments, disaster recovery capabilities, data replication methods, and container orchestration, providing insights into best practices and challenge resolution strategies. This article contributes to understanding cloud migration success factors and offers a structured approach for organizations undertaking modernization initiatives in an increasingly data-driven business landscape.
APA, Harvard, Vancouver, ISO, and other styles
26

Prof. Sathish and Dr Smys S. "A Novel Multi-Tier Architecture Based Mobile Cloud Computing For Enhanced Energy Utilization." Journal of ISMAC 2, no. 1 (2020): 62–72. http://dx.doi.org/10.36548/jismac.2020.1.006.

Full text
Abstract:
The recent advancements in the mobile devices and the growing needs of the mobile users led to the clubbing of mobile devices with the cloud computing developing a platform coined as mobile cloud computing. The main scope of conceiving this clubbed mobile and cloud paradigm is to direct the tasks that are resource and computationally intensive to the cloud for its execution. While the execution takes place in the cloud, the resources of the mobile users that are clubbed with the cloud remains wasted until the responses are received from the cloud. These results in the excess battery drain causing frequent recharges. To put an end to this, the paper puts forward an the multi-tier architectures in-built with the various level of cluster process for processing to properly handle the mobile device participating in the cloud , minimizing the number of idle mobile users and enhances the energy efficiency. The proposed method is validated using the network simulator-II to evince the energy balancing achieved through the proposed multi-tier architecture based MCC-(mobile cloud computing).
APA, Harvard, Vancouver, ISO, and other styles
27

Mamidi, Sundeep Reddy. "Securing Multi-Cloud Architectures: A Machine Learning Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 233–47. http://dx.doi.org/10.60087/jaigs.v2i1.160.

Full text
Abstract:
Multi-cloud computing, the utilization of multiple cloud computing services in a single heterogeneous architecture, has gained significant traction in recent years due to its potential for enhancing flexibility, resilience, and performance. This paper provides an overview of multi-cloud computing, exploring its key concepts, advantages, challenges, and best practices. It examines the motivations behind adopting multi-cloud strategies, the various deployment models, management approaches, and emerging trends. Additionally, the paper discusses the implications of multi-cloud computing for security, interoperability, and vendor lock-in. Through a comprehensive analysis, this paper aims to offer insights into the complexities and opportunities associated with multi-cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
28

Adedamola Abiodun Solanke. "Zero trust security architectures for multi-cloud environments: Implementation strategies and measurable outcomes." World Journal of Advanced Engineering Technology and Sciences 3, no. 2 (2021): 122–34. https://doi.org/10.30574/wjaets.2021.3.2.0054.

Full text
Abstract:
According to current developments, organizations using AWS, Azure, and Google Cloud Platform for multi-cloud strategies have made perimeter security models obsolete. The modern Zero Trust Security Architecture (ZTSA) enables distributed cloud environment security through active access control verification, minimal privileges, and strict continuous verification. The research examines Zero Trust deployment across major cloud service providers before explaining consistent security frameworks and developing implementation guidelines. The program achieves a 95% security breach reduction rate while handling major obstacles like identifying complexities, access policies, identity fragmentation, and systems' expansion requirements. The discussion about Zero Trust in multi-cloud security covers AI-driven automation and post-quantum cryptography and security frameworks for serverless architectures, followed by a structured Zero.
APA, Harvard, Vancouver, ISO, and other styles
29

Yalate, Arunkumarreddy. "Demystifying Multi-Cloud Architecture: Foundational Concepts and Design Patterns." European Journal of Computer Science and Information Technology 13, no. 24 (2025): 51–62. https://doi.org/10.37745/ejcsit.2013/vol13n245162.

Full text
Abstract:
Multi-cloud architecture has emerged as a pivotal strategy for organizations seeking to enhance resilience, prevent vendor lock-in, and meet diverse compliance requirements. This strategic approach integrates services from multiple cloud providers while addressing critical aspects of workload distribution, networking, identity management, and security. Through the implementation of Infrastructure as Code and containerization, organizations can achieve standardized deployments and efficient orchestration across cloud providers. The architecture incorporates robust security frameworks and governance models, ensuring consistent policy enforcement and resource management. Best practices in multi-cloud implementations emphasize standardization, monitoring, failure planning, and complexity management, leading to optimized operations and enhanced business value.
APA, Harvard, Vancouver, ISO, and other styles
30

Martins, Joberto S. B., Tereza C. Carvalho, Rodrigo Moreira, et al. "Enhancing Network Slicing Architectures with Machine Learning, Security, Sustainability and Experimental Networks Integration." IEEE ACCESS 11 (July 6, 2023): 1–20. https://doi.org/10.1109/ACCESS.2023.3292788.

Full text
Abstract:
Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies, mobile edge computing, mobile cloud computing, and verticals like the Internet of Vehicles and industrial IoT, among others. NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications since it allows the optimization and customization of scarce and disputed resources among dynamic, demanding clients with highly distinct application requirements. Various standardization organizations, like 3GPP's proposal for new generation networks and state-of-the-art 5G/6G research projects, are proposing new NS architectures. However, new NS architectures have to deal with an extensive range of requirements that inherently result in having NS architecture proposals typically fulfilling the needs of specific sets of domains with commonalities. The Slicing Future Internet Infrastructures (SFI2) architecture proposal explores the gap resulting from the diversity of NS architectures target domains by proposing a new NS reference architecture with a defined focus on integrating experimental networks and enhancing the NS architecture with Machine Learning (ML) native optimizations, energy-efficient slicing, and slicing-tailored security functionalities. The SFI2 architectural main contribution includes the utilization of the slice-as-a-service paradigm for end-to-end orchestration of resources across multi-domains and multi-technology experimental networks. In addition, the SFI2 reference architecture instantiations will enhance the multi-domain and multi-technology integrated experimental network deployment with native ML optimization, energy-efficient aware slicing, and slicing-tailored security functionalities for the practical domain.
APA, Harvard, Vancouver, ISO, and other styles
31

Abbas, Qaisar, and Abdullah Alsheddy. "Driver Fatigue Detection Systems Using Multi-Sensors, Smartphone, and Cloud-Based Computing Platforms: A Comparative Analysis." Sensors 21, no. 1 (2020): 56. http://dx.doi.org/10.3390/s21010056.

Full text
Abstract:
Internet of things (IoT) cloud-based applications deliver advanced solutions for smart cities to decrease traffic accidents caused by driver fatigue while driving on the road. Environmental conditions or driver behavior can ultimately lead to serious roadside accidents. In recent years, the authors have developed many low-cost, computerized, driver fatigue detection systems (DFDs) to help drivers, by using multi-sensors, and mobile and cloud-based computing architecture. To promote safe driving, these are the most current emerging platforms that were introduced in the past. In this paper, we reviewed state-of-the-art approaches for predicting unsafe driving styles using three common IoT-based architectures. The novelty of this article is to show major differences among multi-sensors, smartphone-based, and cloud-based architectures in multimodal feature processing. We discussed all of the problems that machine learning techniques faced in recent years, particularly the deep learning (DL) model, to predict driver hypovigilance, especially in terms of these three IoT-based architectures. Moreover, we performed state-of-the-art comparisons by using driving simulators to incorporate multimodal features of the driver. We also mention online data sources in this article to test and train network architecture in the field of DFDs on public available multimodal datasets. These comparisons assist other authors to continue future research in this domain. To evaluate the performance, we mention the major problems in these three architectures to help researchers use the best IoT-based architecture for detecting DFDs in a real-time environment. Moreover, the important factors of Multi-Access Edge Computing (MEC) and 5th generation (5G) networks are analyzed in the context of deep learning architecture to improve the response time of DFD systems. Lastly, it is concluded that there is a research gap when it comes to implementing the DFD systems on MEC and 5G technologies by using multimodal features and DL architecture.
APA, Harvard, Vancouver, ISO, and other styles
32

Ramadevi Sannapureddy. "Cloud-Native Enterprise Integration: Architectures, Challenges, and Best Practices." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 167–73. https://doi.org/10.32996/jcsts.2025.7.5.22.

Full text
Abstract:
Cloud-native enterprise integration represents a transformative shift from monolithic middleware to distributed, loosely-coupled architectures that enable organizations to achieve greater business agility and operational efficiency. This article examines the architectural patterns, challenges, and best practices for successful cloud-native integration implementations. By leveraging event-driven architectures, API-first approaches, service meshes, and hybrid integration models, enterprises can create flexible, resilient integration solutions that support modern business requirements. However, these benefits come with significant challenges related to distributed systems complexity, security vulnerabilities, vendor lock-in concerns, legacy system integration, and performance considerations. Through the adoption of DevOps practices, comprehensive observability strategies, container orchestration, robust API security, resilience engineering, and multi-cloud optimization techniques, organizations can overcome these challenges and realize the full potential of cloud-native integration. The implementation framework presented provides a practical roadmap for organizations at any stage of their cloud-native journey, encompassing assessment, architecture definition, platform selection, governance establishment, and iterative implementation. By following this structured approach, enterprises can successfully navigate the complexities of modern integration landscapes and deliver tangible business value through their cloud-native initiatives.
APA, Harvard, Vancouver, ISO, and other styles
33

Naga Swetha Kattula. "Next-Gen Cloud: The future of secure and seamless cross-platform integrations." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1302–8. https://doi.org/10.30574/wjarr.2025.26.1.1090.

Full text
Abstract:
The rapid evolution of enterprise cloud computing has necessitated innovative architectural approaches to address the complexities of multi-cloud environments while maintaining robust security. This article explores transformative technologies reshaping cross-platform integrations in modern cloud ecosystems. The convergence of AI-driven API management platforms has revolutionized the governance and security aspects of cloud integration, enabling organizations to achieve unprecedented operational efficiencies. Confidential Computing represents a paradigm shift in data security, utilizing hardware-based Trusted Execution Environments to maintain data encryption during processing, thereby addressing critical privacy concerns for regulated industries. Zero Trust Architecture provides a comprehensive security framework that transcends traditional perimeter-based models, implementing continuous verification mechanisms across distributed cloud resources. Event-driven Architectures deliver the real-time integration capabilities essential for responsive business operations across geographically dispersed systems. Together, these technologies create a foundation for secure, seamless cross-platform integration that empowers enterprises to leverage the strategic advantages of multi-cloud deployments while mitigating associated risks. The article provides quantitative insights into implementation benefits spanning operational efficiency, security posture, compliance management, and economic impact, demonstrating how these technologies collectively enable organizations to achieve the agility required in today's dynamic business environment.
APA, Harvard, Vancouver, ISO, and other styles
34

Sai Teja Battula. "A Comprehensive Framework for Evaluating the Scalability and Security of Fintech Web Applications in a Cloud-Native Environment." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1940–50. https://doi.org/10.32628/cseit23112567.

Full text
Abstract:
This article presents a comprehensive framework for evaluating and designing cloud-native fintech applications that balance scalability requirements with robust security postures. As financial institutions increasingly migrate to cloud environments, they face complex challenges at the intersection of technological innovation, regulatory compliance, and cybersecurity. The article examines core architectural considerations, including scalability patterns like microservices and event-driven design, alongside essential security frameworks such as zero-trust architecture and defense-in-depth strategies. It explores cloud-native deployment approaches through container orchestration and serverless architectures while addressing specific challenges related to latency management, multi-tenancy considerations, and data sovereignty requirements. The article provides systematic metrics for assessing fintech architectures across three critical dimensions: scalability metrics to measure performance under varying conditions, security posture evaluations to ensure comprehensive threat mitigation and operational excellence indicators to maintain service reliability. It enables financial institutions to build resilient, compliant, and efficient cloud-native applications that adapt to evolving market demands and regulatory landscapes.
APA, Harvard, Vancouver, ISO, and other styles
35

Rodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.

Full text
Abstract:
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.
APA, Harvard, Vancouver, ISO, and other styles
36

Jin, Xinkun, Zijun He, and Zongqi Liu. "Multi-Agent-Based Cloud Architecture of Smart Grid." Energy Procedia 12 (2011): 60–66. http://dx.doi.org/10.1016/j.egypro.2011.10.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Houacine, Fatiha, Samia Bouzefrane, and Aghiles Adjaz. "Service architecture for multi-environment mobile cloud services." International Journal of High Performance Computing and Networking 9, no. 4 (2016): 342. http://dx.doi.org/10.1504/ijhpcn.2016.077830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Alonso, Antonio, Henrik Saavedra Persson, and Hossein Kassaei. "5G architecture for hybrid and multi-cloud environments." Ericsson Technology Review 2022, no. 3 (2022): 2–12. http://dx.doi.org/10.23919/etr.2022.9904693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dimpy Jindal, Et al. "Smart Ontology Framework for Multi-Tenant Cloud Architecture." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 3506–14. http://dx.doi.org/10.17762/ijritcc.v11i9.9563.

Full text
Abstract:
The exponential growth of data complexity in an era marked by the rapid expansion of the computer environment has led to an increase in the demand for scalable and effective systems. The crucial stage of data management, which acts as a vital conduit for accelerating the processing of enormous amounts of data, is at the centre of this paradigm. Scientific workflows must be coordinated in order to orchestrate the management of large datasets within this complex ecosystem. These workflows differ from generic workflows in that they involve a complex interplay of scheduling, algorithms, data flow, processes, operational protocols, and a focused attention on data-intensive systems. Software as a Service's (SaaS) distinctive feature of multi-tenancy is inextricably related to the growth of the industry. In this complex fabric, the investigation of scientific processes reveals a mutually beneficial relationship with the multi-tenant cloud orchestration environment, revealing a realm that goes beyond simple control and data propagation. It opens a fresh path for system development and makes service delivery's previously hidden facets visible. This study pioneers an exploration into a thorough framework for scientific operations within the context of multi-tenant cloud orchestration. Semantics-based workflows, which leverage semantics to help users manage the complexities of data orchestration, form the basis of this paradigm. In addition, policy-based processes provide another level of intricacy, giving users a flexible way to manoeuvre the complex environment of multi-tenancy, orchestration, and service identification. The study focuses on the fundamentals of orchestrating scientific workflows in a multi-tenant cloud environment, where the creative, scalable, and effective composition results from the harmonious integration of data and semantics under the guidance of rules.
APA, Harvard, Vancouver, ISO, and other styles
40

Muralidhara, Pavan, and Vaishnavi Janardhan. "Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments." International Journal of Scientific Research and Management (IJSRM) 4, no. 9 (2016): 4636–64. https://doi.org/10.18535/ijsrm/v4i9.22.

Full text
Abstract:
As organisations are deploying multiple clouds to scale, gain flexibility and cost optimisation the challenge of securing these architectures grows exponentially. Conventional logical security platforms that are based on perimeters cannot effectively guard current complex cloud environments. Currently, however, there is a need to develop methods for their implementation, which refers to the Zero Trust Architecture (ZTA) approach with the overall slogan “Never Trust, Always Verify”. This security model means that any user, device, and network request is authenticated, authorized and monitored all the time irrespective of the source. In multi-cloud where applications, data and computing resources are located across various cloud service providers, use of Zero Trust lowers the risks of threats and cyber-attacks by minimizing the exposures that bad actors can exploit, and hardening control of entry to assets. Drawing on theory and research, this paper considers the advantages and disadvantages of the Zero Trust model, the processes that need to be completed to introduce it to the multi-cloud infrastructure, and possible case studies. Hence, Identity and Access Management, Micro-segmentation, and continuous monitoring can help the organization enhance the cloud security posture, and minimize compliance and risks related to sophisticated cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
41

Zhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.

Full text
Abstract:
The subject of the study is is the security architecture of the Internet of Things (IoT) based on fog computing, which allows providing efficient and secure services for many IoT users. The goal is to investigate the security architecture for IoT systems based on fog computing. To achieve the goal, the following tasks were solved: the concept of fog computing is proposed, its architecture is considered and a comparative analysis of fog and cloud computing architectures is made; the principles of designing and implementing the architecture of a fog computing system are outlined; multi-level security measures based on fog computing are investigated; and the areas of use of fog computing-based Internet of Things networks are described. When performing the tasks, such research methods were used as: theoretical analysis of literature sources; analysis of the principles of designing and implementing the security architecture of the Internet of Things; analysis of security measures at different levels of the architecture. The following results were obtained: the architecture of fog computing is considered and compared with the cloud architecture; the principles of designing and implementing the architecture of fog computing systems are formulated; multi-level IoT security measures based on fog computing are proposed. Conclusions: research on IoT security systems based on fog computing has important theoretical implications. The fog computing architecture, in contrast to the cloud architecture, better meets the demand for high traffic and low latency of mobile applications, providing more advantages for systems that require real-time information processing. When designing and implementing the architecture of fog computing systems, the factors of memory capacity, latency, and utility should be taken into account to effectively integrate fog technologies with IoT. To ensure a high level of system security, multi-level security measures should be implemented using both software and hardware solutions.
APA, Harvard, Vancouver, ISO, and other styles
42

.Nishchitha TS, Prof. "A Secure Approach for Multicloud Environment." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48917.

Full text
Abstract:
Abstract The adoption of multi-cloud environments—where organizations leverage services from multiple cloud providers—has grown significantly due to the demand for increased flexibility, redundancy, and cost optimization. However, this paradigm introduces complex security challenges, including data privacy, access control, inter-cloud communication risks, and compliance management. This paper presents a secure approach for managing and protecting data and services in a multi-cloud architecture. The proposed framework integrates encryption, federated identity management, policy-based access control, and secure communication protocols to mitigate potential threats. It also emphasizes the role of automation and continuous monitoring to enforce consistent security policies across heterogeneous cloud platforms. Experimental analysis and threat modeling demonstrate that the proposed approach significantly enhances data confidentiality, integrity, and system resilience in multi-cloud deployments. This work contributes toward building more robust, scalable, and secure cloud strategies for enterprise and government applications. 1. Keywords: Multi-Cloud Security, 2. Cloud Computing, 3. Data Privacy, 4. Access Control, 5. Encryption, 6. Federated Identity Management, 7. Secure Communication, 8. Cloud Compliance, 9. Threat Mitigation, 10. Cloud Infrastructure, 11. Cloud Integration, 12. Policy Enforcement, 13. Cybersecurity, 14. Cloud Risk Management, 15. Cloud Security Architecture
APA, Harvard, Vancouver, ISO, and other styles
43

Segun Adanigbo, Oluwasanmi, Bolaji Iyanu Adekunle, Ejielo Ogbuefi, Oyejide Timothy Odofin, Oluwademilade Aderemi Agboola, and Denis Kisina. "Implementing Zero Trust Security in Multi-Cloud Microservices Platforms: A Review and Architectural Framework." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2402–9. https://doi.org/10.62225/2583049x.2024.4.6.4357.

Full text
Abstract:
The widespread adoption of multi-cloud infrastructures and microservices architectures has redefined enterprise computing by enhancing scalability, modularity, and service delivery. However, this decentralization has also introduced expanded threat surfaces and complex security challenges that traditional perimeter-based models can no longer address effectively. This paper presents a comprehensive review and a proposed architectural framework for implementing Zero Trust Security (ZTS) in multi-cloud microservices environments. Beginning with a synthesis of existing literature and industry best practices, the study identifies critical vulnerabilities and limitations in current security approaches. It then explores the foundational principles of Zero Trust—including least privilege, continuous verification, and identity-centric access control—and how they apply within distributed cloud-native systems. The proposed framework incorporates core security components such as identity and access management, centralized policy engines, micro-segmentation, and service mesh integration to enable fine-grained, context-aware access enforcement. Designed for cloud-agnostic compatibility, the architecture facilitates secure workload mobility and dynamic service discovery across heterogeneous environments. Practical considerations, including performance impact, interoperability challenges, and governance implications, are also discussed. Although the framework offers a strategic path toward resilient multi-cloud security, it acknowledges limitations in empirical validation and implementation variability. The paper concludes by recommending future research directions in adaptive trust scoring, AI-driven policy enforcement, and Zero Trust extensions to edge-cloud systems, thus contributing to the ongoing evolution of secure cloud-native computing.
APA, Harvard, Vancouver, ISO, and other styles
44

Mandat, Sasikanth Reddy. "The influence of multi cloud strategy." South Asian Journal of Engineering and Technology 9, no. 1 (2019): 1–4. http://dx.doi.org/10.26524/sajet.3.

Full text
Abstract:
The study describes the architecture of multi cloud strategy in the IT and computer sector.The study provides the techniques which are involved in the cloud strategy, its usages and importance in the growing world. The study also highlights the working and elements involved in multi cloud strategy along with the future applications of it.
APA, Harvard, Vancouver, ISO, and other styles
45

Jyoti Aggarwal. "Building global-scale distributed cloud systems for millions of mobile customers." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 043–50. https://doi.org/10.30574/wjarr.2025.26.2.1590.

Full text
Abstract:
This article addresses the architectural challenges involved in building global-scale distributed cloud systems for mobile customers. It examines key components necessary for delivering consistent, low-latency experiences to users worldwide while maintaining high availability, security, and cost efficiency. The article explores foundational architecture elements, including multi-region deployment models, load-balancing strategies, content delivery networks, and API gateway architectures. It further investigates data management strategies covering distributed database architectures, consistency models, caching approaches, and data sovereignty requirements. Additional sections detail scalability optimization techniques, including autoscaling, microservices, asynchronous processing, and deployment automation, followed by an in-depth look at reliability practices and operational excellence. Throughout, the article presents real-world performance metrics and implementation strategies to provide a comprehensive framework for organizations building or expanding mobile cloud infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
46

Ravikanth Reddy Gudipati. "Implementing a multi-tenant FIDO relying party server: Architecture, security, and scalability considerations." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 765–73. https://doi.org/10.30574/wjaets.2025.15.1.0304.

Full text
Abstract:
The transition to passwordless authentication using FIDO standards marks a transformative shift in modern security architecture, particularly in multi-tenant environments. This technical exploration delves into the comprehensive implementation considerations for building robust multi-tenant FIDO Relying Party (RP) servers. The content addresses key architectural components, including WebAuthn and CTAP protocol integration, database architecture models, tenant isolation strategies, and identity federation mechanisms. Critical security aspects, including cross-tenant protection and audit logging, are examined alongside cloud-native deployment considerations. The discussion encompasses essential elements of scalability, maintainability, and security controls required for successful FIDO-based passwordless authentication in multi-tenant environments.
APA, Harvard, Vancouver, ISO, and other styles
47

Dong, Zhao Yang, and Lin Zhang. "A Comprehensive Security Strategy Applying to the Total Life Cycle of Cloud Computing Data Center." Applied Mechanics and Materials 556-562 (May 2014): 6259–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6259.

Full text
Abstract:
Aiming at the security issues of cloud computing data center, the systematic security construction architecture of cloud computing data center is proposed. By surrounding the key aspects of security construction, such as infrastructure security, virtual security, cloud authentication and authorization, data isolation and protection, cloud platform and cloud service security, security operation maintenance, cloud computing platform migration, and disaster recovery backup, the security architecture constructs a multi-level, multi-angle tridimensional defense system in depth. It ensures the life cycle security for resource services of the cloud computing data center. Many key problems are further discussed in detail, such as the problem of data storage security, security domain isolation, cloud computing platform tenants accessing, and terminal accessing. This paper provides reference for the security construction of cloud computing data center, and gives guide to the implementation of the relevant security measures.
APA, Harvard, Vancouver, ISO, and other styles
48

Swati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.

Full text
Abstract:
Although multi-tenant cloud infrastructures are more cost-effective and scalable, they also raise serious security issues, especially with regard to insider threats and data breaches. The security and integrity of data are seriously threatened by these dangers, which come from authorised users. By examining potential insider threats, risk factors, and mitigation techniques, this study investigates the vulnerabilities present in multi-tenant cloud infrastructures. To improve cloud security, a multi-layered security architecture is suggested, incorporating enhanced access control mechanisms, behavioral analytics, and Zero Trust Architecture. Moreover, encryption, continuous monitoring, and employee awareness programs are also discussed as mandatory elements for risk mitigation. With the implementation of proactive security measures, organizations can solidify their defenses against new cyber threats and maintain safe cloud operations.
APA, Harvard, Vancouver, ISO, and other styles
49

Mugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes." International Journal of Information Security and Privacy 11, no. 1 (2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.

Full text
Abstract:
In cloud storage systems, data security management is becoming a serious matter. Big data and accessibility power is increasingly high, though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. As a result, cloud storage security has become one of the driving components in Cloud Computing regarding to data manipulation trust on both hosting center and on-transit. This paper proposes a TPM-Based Security over Multi-Cloud Storage Architecture (MCSA) grounded on Erasure Codes to apply root of trust based on hardware authenticity. An erasure codes such as Reed-Solomon, is capable of assuring stability in storage costs with best practice to guarantee data accessibility failure recovery. A Multi-Cloud Control Node manages other Control Nodes evolved in the cloud; this work introduces TPM-Based Security functions per Control node in the architecture. This concept will resolve a number of storage security issues, hence Cloud Computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
50

Shinu Pushpan. "Multi-Tenant Architecture: A Comprehensive Framework for Building Scalable SaaS Applications." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1117–26. https://doi.org/10.32628/cseit241061151.

Full text
Abstract:
Multi-tenant architecture has emerged as a fundamental paradigm in modern software development, particularly in Software as a Service (SaaS) applications where multiple organizations share computing resources while maintaining data isolation. This article presents a comprehensive framework for understanding and implementing multi-tenant systems, focusing on essential architectural decisions and design patterns that ensure scalability, security, and resource efficiency. The article examines the evolution from single-tenant to multi-tenant architectures, analyzes various data partitioning strategies, and explores critical aspects of tenant isolation, authentication, and authorization mechanisms. The article addresses key challenges in performance optimization, resource allocation, and security implementation, providing practical insights into database design approaches and caching strategies. Through a structured approach, this article bridges the gap between theoretical concepts and practical implementation, offering developers and architects a foundation for building robust multi-tenant systems. The findings emphasize the importance of balanced architectural decisions that accommodate both technical requirements and business objectives while maintaining system integrity and tenant isolation. This article contributes to the growing body of knowledge in cloud computing and distributed systems, providing practitioners with actionable insights for developing scalable multi-tenant applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography