Academic literature on the topic 'Multi-Cloud Security Architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-Cloud Security Architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multi-Cloud Security Architecture"

1

S. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Santosh, Pashikanti. "Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework." International Journal of Leading Research Publication 4, no. 9 (2023): 1–4. https://doi.org/10.5281/zenodo.14646896.

Full text
Abstract:
The rise of multi-cloud environments has introduced new complexities in securing distributed systems. Traditional perimeter-based security models no longer suffice, necessitating the adoption of Zero Trust Architecture (ZTA). Zero Trust enforces strict access controls based on identity, device posture, and continuous verification, irrespective of network location. This paper presents a detailed framework for implementing Zero Trust Architecture across multi-cloud environments. It outlines the architectural components, technologies, challenges, and best practices to ensure robust security.
APA, Harvard, Vancouver, ISO, and other styles
3

Munde, Amit V., and Dr Pranjali P. Deshmukh. "Multi Cloud Data Hosting with SIC Architecture." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1830–33. http://dx.doi.org/10.22214/ijraset.2022.40999.

Full text
Abstract:
Abstract: Data hosting on cloud decreases cost of IT maintenance and data reliability get enhance. Nowadays, customers can store their data on single cloud, which has some drawbacks. First is vendor lock in problem and second is security on cloud. The solution to this problem is to store the data on different cloud server without redundancy using encryption algorithm. Customers do not want to lose their sensitive data on cloud. Another issue of cloud computing is data thievery should be overcome to supply higher service. Multi-cloud environment has ability to scale back security risks. To avoid security risk we offer framework. Keywords: Cloud computing, cloud storage, data hosting, data intrusion, multi-cloud, single cloud.
APA, Harvard, Vancouver, ISO, and other styles
4

Satyanarayan Kanungo and Saumya Sarangi. "Quantum computing integration with multi-cloud architectures: enhancing computational efficiency and security in advanced cloud environments." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 564–74. http://dx.doi.org/10.30574/wjaets.2024.12.2.0319.

Full text
Abstract:
The objective of this research is to explore the integration of quantum computing with multi-cloud architectures, aiming to enhance computational efficiency and security in advanced cloud environments. The study seeks to identify the potential benefits and challenges of incorporating quantum computing capabilities within a multi-cloud framework and to evaluate the impact on performance and security metrics. The research employs a hybrid methodological approach, combining both theoretical analysis and practical implementation. Initially, a detailed literature review is conducted to understand the current state of quantum computing and multi-cloud architectures. This is followed by the design and development of an integration framework that leverages quantum computing technologies in a multi-cloud environment. Key steps include developing a multi-cloud architecture that integrates quantum computing resources alongside classical computing resources, deploying quantum algorithms and protocols within the multi-cloud setup, implementing advanced security measures to protect data and computational processes, using a set of predefined metrics to evaluate computational efficiency and security, and employing statistical tools and techniques to analyze the collected data and draw meaningful insights. The integration of quantum computing with multi-cloud architectures resulted in significant improvements in computational efficiency, particularly in tasks that are traditionally resource-intensive. Key findings include enhanced computational speed, where quantum algorithms demonstrated superior performance in solving complex problems compared to classical algorithms, optimized resource utilization through dynamic allocation of quantum and classical resources leading to cost efficiency, improved security with quantum-enhanced protocols providing robust protection against cyber threats, and high scalability of the integrated architecture to accommodate increasing computational demands without compromising performance. The research concludes that integrating quantum computing with multi-cloud architectures offers substantial benefits in terms of computational efficiency and security. The findings indicate that such integration can revolutionize cloud computing, providing a powerful platform for handling complex computations and enhancing data security. However, the study also highlights several challenges, including the need for specialized hardware, the complexity of integration, and the necessity for ongoing research to fully harness the potential of quantum computing in cloud environments. Future research should focus on addressing these challenges and exploring further applications of quantum computing in various cloud-based scenarios.
APA, Harvard, Vancouver, ISO, and other styles
5

Nikhil, Bhagat. "Optimizing Performance, Cost-Efficiency, and Flexibility through Hybrid Multi-Cloud Architectures." Journal of Scientific and Engineering Research 11, no. 4 (2024): 372–79. https://doi.org/10.5281/zenodo.14273093.

Full text
Abstract:
Cloud Computing is the foundation of every modern company that is scalable, adaptable and economical. Hybrid multi-cloud environments, which combine private clouds, public clouds, and multiple cloud providers, represent the next generation for scaling cloud infrastructures. Hybrid cloud architecture lets organizations reap the security and control benefits of a private cloud while also taking advantage of the scalability and cost efficiency of a public cloud. Meanwhile, multi-cloud models avoid vendor lock-in, provide risk mitigation, and enable organizations to choose the best options from multiple providers. Hybrid and multi-cloud solutions together offer an integrated cloud architecture that maximizes usage, performance, and resilience. The paper delves into the advantages of hybrid and multi-cloud environments, including agility, cost efficiency and increased security. The paper also touches on organizational design considerations such as workload assignment, interoperability, security, and vendor selection. The paper provides guidelines for implementing hybrid multi-cloud environments where orchestration tools and automation play a vital role to facilitate the operations. Even though Hybrid multi-cloud architectures provide greater flexibility, they must be strategically designed, implemented and managed. By modernizing these environments, businesses can enhance performance, profitability, and agility, better preparing them to thrive in today’s competitive market.
APA, Harvard, Vancouver, ISO, and other styles
6

Adedamola Abiodun Solanke. "Zero trust security architectures for multi-cloud environments: Implementation strategies and measurable outcomes." World Journal of Advanced Engineering Technology and Sciences 3, no. 2 (2021): 122–34. https://doi.org/10.30574/wjaets.2021.3.2.0054.

Full text
Abstract:
According to current developments, organizations using AWS, Azure, and Google Cloud Platform for multi-cloud strategies have made perimeter security models obsolete. The modern Zero Trust Security Architecture (ZTSA) enables distributed cloud environment security through active access control verification, minimal privileges, and strict continuous verification. The research examines Zero Trust deployment across major cloud service providers before explaining consistent security frameworks and developing implementation guidelines. The program achieves a 95% security breach reduction rate while handling major obstacles like identifying complexities, access policies, identity fragmentation, and systems' expansion requirements. The discussion about Zero Trust in multi-cloud security covers AI-driven automation and post-quantum cryptography and security frameworks for serverless architectures, followed by a structured Zero.
APA, Harvard, Vancouver, ISO, and other styles
7

Manne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 7, no. 3 (2025): 74–82. https://doi.org/10.47941/ijce.2753.

Full text
Abstract:
Purpose: The purpose of this study is to examine the implementation of Zero Trust Architecture (ZTA) within multi-cloud environments, where traditional perimeter-based security models are increasingly inadequate. The paper aims to identify and address the unique security challenges posed by multi-cloud infrastructures, such as identity and access management (IAM), policy enforcement, network segmentation, and continuous monitoring. Methodology: The research analyzes established industry frameworks, notably NIST Special Publication 800-207, to provide a theoretical foundation for ZTA. It explores practical implementation strategies by evaluating real-world case studies and assessing technologies such as AI-driven threat detection, identity federation, and software-defined perimeters. Comparative analysis of cloud service provider tools and standardization techniques is also conducted to identify best practices for cross-cloud security. Findings: The study finds that implementing ZTA in multi-cloud environments significantly enhances security postures by minimizing attack surfaces and improving regulatory compliance. Effective integration of AI, federated identity solutions, and cloud-native security tools enables continuous verification and least privilege access control. Unique Contribution to Theory, Practice and Policy: The research concludes that while ZTA presents interoperability and policy enforcement challenges, these can be mitigated through standardized frameworks and automation, making ZTA a viable model for modern cloud security.
APA, Harvard, Vancouver, ISO, and other styles
8

Manne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 4, no. 3 (2023): 1–9. https://doi.org/10.47941/ijce.2754.

Full text
Abstract:
Purpose: The purpose of this study is to examine the implementation of Zero Trust Architecture (ZTA) within multi-cloud environments, where traditional perimeter-based security models are increasingly inadequate. The paper aims to identify and address the unique security challenges posed by multi-cloud infrastructures, such as identity and access management (IAM), policy enforcement, network segmentation, and continuous monitoring. Methodology: The research analyzes established industry frameworks, notably NIST Special Publication 800-207, to provide a theoretical foundation for ZTA. It explores practical implementation strategies by evaluating real-world case studies and assessing technologies such as AI-driven threat detection, identity federation, and software-defined perimeters. Comparative analysis of cloud service provider tools and standardization techniques is also conducted to identify best practices for cross-cloud security. Findings: The study finds that implementing ZTA in multi-cloud environments significantly enhances security postures by minimizing attack surfaces and improving regulatory compliance. Effective integration of AI, federated identity solutions, and cloud-native security tools enables continuous verification and least privilege access control. Unique Contribution to Theory, Practice and Policy: The research concludes that while ZTA presents interoperability and policy enforcement challenges, these can be mitigated through standardized frameworks and automation, making ZTA a viable model for modern cloud security.
APA, Harvard, Vancouver, ISO, and other styles
9

Rodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.

Full text
Abstract:
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.
APA, Harvard, Vancouver, ISO, and other styles
10

Muralidhara, Pavan, and Vaishnavi Janardhan. "Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments." International Journal of Scientific Research and Management (IJSRM) 4, no. 9 (2016): 4636–64. https://doi.org/10.18535/ijsrm/v4i9.22.

Full text
Abstract:
As organisations are deploying multiple clouds to scale, gain flexibility and cost optimisation the challenge of securing these architectures grows exponentially. Conventional logical security platforms that are based on perimeters cannot effectively guard current complex cloud environments. Currently, however, there is a need to develop methods for their implementation, which refers to the Zero Trust Architecture (ZTA) approach with the overall slogan “Never Trust, Always Verify”. This security model means that any user, device, and network request is authenticated, authorized and monitored all the time irrespective of the source. In multi-cloud where applications, data and computing resources are located across various cloud service providers, use of Zero Trust lowers the risks of threats and cyber-attacks by minimizing the exposures that bad actors can exploit, and hardening control of entry to assets. Drawing on theory and research, this paper considers the advantages and disadvantages of the Zero Trust model, the processes that need to be completed to introduce it to the multi-cloud infrastructure, and possible case studies. Hence, Identity and Access Management, Micro-segmentation, and continuous monitoring can help the organization enhance the cloud security posture, and minimize compliance and risks related to sophisticated cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Multi-Cloud Security Architecture"

1

Palesandro, Alex. "Deployment and Security Supervision for multi-cloud architectures." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE3071/document.

Full text
Abstract:
Le Cloud Computing représente une des plus importantes avancées numériques de ces dix dernières années. Le modèle de service offert par le cloud computing est basé sur une allocation élastique et à la demande des ressources et une facturation au plus juste de leur utilisation. Plusieurs catégories d’application sont en train de migrer vers le cloud (par exemple : les NFV et les applications du Big Data). D’autres domaines applicatifs, soumis à une législation plus stricte, sont plus frileux. Leurs exigences sont souvent liées à des problématiques de sécurité et/ou à la non satisfaction par les ressources proposées par un cloud unique, peuvent trouver des réponses dans l’utilisation conjointe de plusieurs fournisseurs de cloud computing (CSPs). L’exploitation simultanée, flexible, efficace et simplifiée de plusieurs clouds requiert des propriétés qui assurent sa viabilité et son acceptation tout d’abord par les fournisseurs de clouds qui proposent des offres hétérogènes et non interopérables et qui souvent pour des raisons commerciales, ne sont pas disposés à coopérer pour faciliter le multi-cloud « à la carte » ; mais aussi du point de vue du consommateur de services cloud dont les contraintes sont le temps de mise en service et le besoin d’exprimer les besoins en services et leur configuration de manière simple et transparente et de permettre la définition de configurations de déploiement adaptées aux besoins de chaque consommateur, comparables à celles offertes par les clouds privés et optimisées pour tirer profit des spécificités de chaque fournisseur de cloud. Dans cette thèse, nous proposons un framework permettant d’exprimer indépendamment de toute solution sous-jacente les besoins en services et en fournisseurs de cloud et de générer efficacement des infrastructures de déploiement extensibles, adaptatives et contrôlables par le consommateur. Cette solution est composée de MANTUS, un outil permettant l’expression des besoins et la génération automatique d’instances, d’ORBITS, des infrastructures de déploiement multi-cloud adaptables dynamiquement grâce aux mécanismes autonomiques offerts par MANTUS.La solution proposée se décline en plusieurs contributions : tout d’abord l’extension d’un framework IaC (Infrastructure as a Code) existant, dédié à la construction de solutions multi-cloud par des mécanismes de tissage, caractéristiques de la programmation par aspects (AOP), permettant ainsi d’injecter et d’extraire des ressources à la demande. Cette extension, expérimentée sur le framework TOSCA a nécessité la proposition du langage TML (Tosca Manipulation Language) permettant de formaliser et de manipuler ces extensions. Les expérimentations effectuées montrent une surcharge acceptable induite par le mécanisme de tissage. La seconde contribution a été de doter le framework IaC TOSCA d’un outil d’expression des besoins et d’un algorithme de matching en terme, d’une part, de nombre et de caractéristiques de fournisseur de cloud -notamment la localisation- et d’autre part en terme de caractéristiques des services proposés par ceux-ci, permettant de trouver la configuration multi-cloud la plus adaptée. La troisième contribution est la définition d’une architecture « template » multi-couche, ORBITS, offrant des mécanismes d’interopérabilité inter-cloud et une vision haut niveau indépendante des clouds sous jacents. Enfin la dernière contribution proposée est la pile de virtualisation U-cloud et les protocoles liée à son déploiement qui permettent de délimiter les zones contrôlables par le consommateur des zones contrôlées par le provider. Cette proposition est basée sur l’utilisation conjointe de la virtualisation imbriquée (Nested Virtualization) et des micro-hyperviseurs réduisant la zone d’attaque (TCB)<br>Cloud Computing represents one of the most important changes in information and communications technology (ICT) of the latest ten years. However, after a decade since its commercial debut, there are still several applications that cloud computing is not able to fully serve. These are the applications that, due to their particularly stringent requirements, must rely simultaneously on multiple Cloud Service Providers (CSPs), rather than only one. Multiple CSPs can in fact offer a better availability, improve QoS, and break the business dependence w.r.t. a single CSP. A cloud infrastructure based on multiple CSPs is called multi-cloud.Despite the benefits of multi-clouds, organisations (i.e developers and operators of IT services) seldom accept the challenge of building applications and crossing multiple CSP domains. In fact, multi-CSP architectures come at the cost of more complex applications and the logic to in terms of architecture and performance optimization.Recently, Multi-cloud client-oriented architectures emerged as important approach to construct multi-cloud applications. It provides cloud consumers a mechanism to allocate resources over multiple CSPs without requiring any cooperation among the CSPs themselves.In particular, Infrastructure as Code-based (IaC-based) represent the reference paradigm when building multi-cloud applications.However, the adoption of IaC in the multi-cloud context us limited by the fact that the cloud consumer cannot easily reuse the infrastructure code across different applications. This is due to two major problems, which we investigate in this manuscript.First, infrastructure are composed of functional (e.g. resources for applications) and non-functional services (e.g. monitoring). Non-functional related code should be shared at most across different applications and cloud consumers. However, this separation between functional and non-functional code is often blurred and, therefore, non-functional code is hard to be shared across them. This enables the possibility of code re-using across different cloud consumers (e.g., their different multi-cloud infrastructures) and static analysis of infrastructure templates. Furthermore, we present a TML (TOSCA Manipulation Language) aspect specification language to dynamically inject “non-functional” services to the virtual multi-cloud infrastructure. Secondly, the multi-cloud paradigm is limited by the “least common denominator” barrier. The cloud consumer can hardly obtain an optimized usage of resources and services through existing IaC frameworks. Despite compatible with different CSPs, those frameworks do not specialize the output according to deployment context.To tackle the “under-specialization” of multi-cloud templates, we introduce a “context-based matching” scheduling algorithm to select the most compelling set of CSPs according to the cloud consumer needs.To validate such contributions, we defined an end-to-end workflow to optimize a multi-cloud infrastructure definition. More precisely, in our model, the cloud consumer initially models the IaC code as an high-level graph of services, leveraging the combination of TML and context-based matching adoption. The output of this workflow is the instantation of such optimized and fully-featured multi-cloud on most suitable CSPs. We implemented Mantus, a multi-cloud compiler, which encapsulates this workflow and we benchmarked this implementation according to different perspectives as scalability and performance
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multi-Cloud Security Architecture"

1

Song, Liang, Haibin Chen, Hejiao Huang, and Hongwei Du. "Multi-echelon Vehicle Routing Problem in Sensor-Cloud Architecture with Mobile Sinks." In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Slawik, Mathias, Begüm Ilke Zilci, Axel Küpper, et al. "An Economical Security Architecture for Multi-cloud Application Deployments in Federated Environments." In Economics of Grids, Clouds, Systems, and Services. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61920-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Talib, Amir Mohamed, Rodziah Atan, Rusli Abdullah, and Masrah Azrifah Azmi Murad. "Ensuring Security and Availability of Cloud Data Storage Using Multi Agent System Architecture." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32826-8_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haque, Kazi Nymul, Johirul Islam, Ijaz Ahmad, and Erkki Harjula. "Decentralized Pub/Sub Architecture for Real-Time Remote Patient Monitoring: A Feasibility Study." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59080-1_4.

Full text
Abstract:
AbstractThe confluence of the Internet of Things (IoT) within the healthcare sector, called Internet of Medical Things (IoMT), has ushered in a transformative approach to real-time patient monitoring. Traditional methods that typically involve the direct transmission of medical sensor data to the cloud, falter under the constraints of medical IoT devices. In response, Multi-access Edge Computing (MEC), as defined by the European Telecommunications Standards Institute (ETSI), brings forth an innovative solution by relocating computing resources closer to the origin of data. However, MEC alone does not fully address the exigencies of constrained medical IoTs in the realm of real-time monitoring. Our architecture advances the computing continuum by seamlessly integrating local edge computing for direct data capture, MEC for nuanced data processing, and cloud computing for the comprehensive synthesis and presentation of data. This synergy is further enhanced by the introduction of a robust message queue mechanism, assuring data resilience and uninterrupted data streaming during network disruptions. With a steadfast commitment to security, our system employs stringent measures to ensure the integrity and confidentiality of sensitive patient data during transmission. This architecture represents a significant leap in healthcare technology, emphasizing the criticality of patient safety, data security, and meticulous data management. The implications of this study are profound, indicating a trajectory for future exploration into the integration of sophisticated data types and AI-driven models to further refine patient monitoring and healthcare outcomes.
APA, Harvard, Vancouver, ISO, and other styles
5

Misbah, Anass, and Ahmed Ettalbi. "Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76354-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shen, Lu, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, and Xiaoguang Liu. "CloudS: A Multi-cloud Storage System with Multi-level Security." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27137-8_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kasmi, Najlae, Mostapha Zbakh, and Amine Haouari. "Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture." In Cloud Computing and Big Data: Technologies, Applications and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97719-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Godhrawala, Husain, and R. Sridaran. "Improving Architectural Reusability for Resource Allocation Framework in Futuristic Cloud Computing Using Decision Tree Based Multi-objective Automated Approach." In Advancements in Smart Computing and Information Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23092-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lampathaki, Fenareti, Evmorfia Biliri, Tasos Tsitsanis, Kostas Tsatsakis, Dimitris Miltiadou, and Konstantinos Perakis. "Toward an Energy Data Platform Design: Challenges and Perspectives from the SYNERGY Big Data Platform and AI Analytics Marketplace." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_14.

Full text
Abstract:
AbstractToday, the need for “end-to-end” coordination between the electricity sector stakeholders, not only in business terms but also in securely exchanging real-time data, is becoming a necessity to increase electricity networks’ stability and resilience while satisfying individual operational optimization objectives and business case targets of all stakeholders. To this end, the SYNERGY energy data platform builds on state-of-the-art data management, sharing, and analytics technologies, driven by the actual needs of the electricity data value chain. This paper will describe the layered SYNERGY Reference Architecture that consists of a Cloud Infrastructure, On-Premise Environments, and Energy Apps and discuss the main challenges and solutions adopted for (a) the design of custom pipelines for batch and streaming data collection and for data manipulation and analytics (based on baseline or pre-trained machine learning and deep learning algorithms) and (b) their scheduled, on-event, or real-time execution on the cloud, on-premise and in gateways, toward an energy data space. Particular focus will be laid on the design of the SYNERGY AI analytics marketplace that allows for trustful sharing of data assets (i.e., datasets, pipelines, trained AI models, analytics results) which belong to different stakeholders, through a multi-party smart contract mechanism powered by blockchain technologies.
APA, Harvard, Vancouver, ISO, and other styles
10

Mugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-Based Secure Multi-Cloud Storage Architecture Grounded on Erasure Codes." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch014.

Full text
Abstract:
In cloud storage systems, data security management is becoming a serious matter. Big data and accessibility power is increasingly high, though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. As a result, cloud storage security has become one of the driving components in Cloud Computing regarding to data manipulation trust on both hosting center and on-transit. This paper proposes a TPM-Based Security over Multi-Cloud Storage Architecture (MCSA) grounded on Erasure Codes to apply root of trust based on hardware authenticity. An erasure codes such as Reed-Solomon, is capable of assuring stability in storage costs with best practice to guarantee data accessibility failure recovery. A Multi-Cloud Control Node manages other Control Nodes evolved in the cloud; this work introduces TPM-Based Security functions per Control node in the architecture. This concept will resolve a number of storage security issues, hence Cloud Computing adoption.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multi-Cloud Security Architecture"

1

Anand, V., N. Saravanan, and A. Mahendiran. "Advanced Encryption Techniques for Protecting Sensitive Data in Multi Cloud Architecture: A Security First Approach." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Nige, Tengyan Wang, Mu Chen, Xinjian Zhao, Jing Zhang, and Yong Li. "Merkel Tree Combines the "Cloud-Edge-to-End" Multi-Level Collaborative Security Architecture of Blockchain." In 2024 8th Asian Conference on Artificial Intelligence Technology (ACAIT). IEEE, 2024. https://doi.org/10.1109/acait63902.2024.11022155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gaska, Thomas, Aaron Carpenter, and Yu Chen. "Future Avionic System Hybrid Processor Pooled Architectures." In Vertical Flight Society 71st Annual Forum & Technology Display. The Vertical Flight Society, 2015. http://dx.doi.org/10.4050/f-0071-2015-10129.

Full text
Abstract:
Next generation avionics Size Weight and Power (SWaP) can benefit from transformational improvements and flexibility in processing brought on by Moore's Law with proper heterogeneous pooled processor solutions. It is no longer feasible to simply use a modest number of network-connected single-core processors in isolated subsystems; instead, multicore processing is the norm. By 2016-2018, there will be on-chip multicore processors with 16 or more cores on each die integrated with on-chip transformational multi-Teraflop General Purpose Graphics Processing Units (GPGPUs). Heterogeneous reprogrammable System-on-Chip (SoC) devices will include multicore processors mixed with 5 billion transistor Field Programmable Gate Arrays (FPGAs). At this time, many avionics subsystems are just beginning the integration of multicore into safe and secure systems. Similarly, sensor critical avionics systems are still adjusting their heterogeneous processing mix in multicore, FPGA, and GPGPU processing solutions. Pooled processing across subsystems is still very limited in deployment. Subsystem level partitioning and security/safety considerations often still limit the potential SWAP improvement for pooled processing if not properly planned and managed. Legacy software migration also continues to make pooled processing in tech refresh a challenge. This paper presents results of an initial investigation into relevant dual use parallels from adjacent markets with similar challenges. One of the adjacent markets that can be used for open discussion of the heterogeneous pooled processor challenge is the driverless car processor architecture. There are already developments with Teraflop computing in the glove compartment, modular multi-sensor data fusion sensor software, integrated information and infrastructure hardware security, and standards for on-platform/off-platform cloud integration. Future cars will have hardware that runs up to 100 Million lines of code. What can the avionics industry leverage from this adjacent market as it moves forward in hybrid pooled processor architectures?
APA, Harvard, Vancouver, ISO, and other styles
4

Patil, Balkrishna. "Integration of Blockchain with AWS and Azure for Enhanced Cloud Security and Compliance in Multi-Cloud Architectures." In 2025 International Conference on Computing and Communication Technologies (ICCCT). IEEE, 2025. https://doi.org/10.1109/iccct63501.2025.11018983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nair, Raveena R., D. Sreevidya, Chinnem Rama Mohan, Joydeep Banerjee, Kuldeep Chouhan, and Dharamvir. "Comprehensive Approaches to Securing Multi-Cloud Architectures: Best Practices and Emerging Solutions." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seth, Dhruv Kumar, Karan Kumar Ratra, and Aneeshkumar P. Sundareswaran. "AI and Generative AI-Driven Automation for Multi-Cloud and Hybrid Cloud Architectures: Enhancing Security, Performance, and Operational Efficiency." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koley, Santanu, Jayeeta Majumdar, Mihir Baran Bera, and Pinaki Pratim Acharjya. "Multi-Tenancy Architecture for Augmented Security in Cloud Computing." In 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2023. http://dx.doi.org/10.1109/icirca57980.2023.10220638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pengfei Sun, Qingni Shen, Liang Gu, Yangwei Li, Sihan Qing, and Zhong Chen. "Multilateral Security Architecture for Virtualization platform in multi-tenancy cloud environment." In 2013 IEEE Conference Anthology. IEEE, 2013. http://dx.doi.org/10.1109/anthology.2013.6784967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Edet, Henry. "A Reference Architecture for Validating Security Across Multi-Cloud Computing Systems." In EASE 2021: Evaluation and Assessment in Software Engineering. ACM, 2021. http://dx.doi.org/10.1145/3463274.3463345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mbongue, Joel Mandebi, Sujan Kumar Saha, and Christophe Bobda. "A Security Architecture for Domain Isolation in Multi-Tenant Cloud FPGAs." In 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2021. http://dx.doi.org/10.1109/isvlsi51109.2021.00060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography