To see the other types of publications on this topic, follow the link: Multi-Cloud Security Architecture.

Journal articles on the topic 'Multi-Cloud Security Architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-Cloud Security Architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Santosh, Pashikanti. "Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework." International Journal of Leading Research Publication 4, no. 9 (2023): 1–4. https://doi.org/10.5281/zenodo.14646896.

Full text
Abstract:
The rise of multi-cloud environments has introduced new complexities in securing distributed systems. Traditional perimeter-based security models no longer suffice, necessitating the adoption of Zero Trust Architecture (ZTA). Zero Trust enforces strict access controls based on identity, device posture, and continuous verification, irrespective of network location. This paper presents a detailed framework for implementing Zero Trust Architecture across multi-cloud environments. It outlines the architectural components, technologies, challenges, and best practices to ensure robust security.
APA, Harvard, Vancouver, ISO, and other styles
3

Munde, Amit V., and Dr Pranjali P. Deshmukh. "Multi Cloud Data Hosting with SIC Architecture." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1830–33. http://dx.doi.org/10.22214/ijraset.2022.40999.

Full text
Abstract:
Abstract: Data hosting on cloud decreases cost of IT maintenance and data reliability get enhance. Nowadays, customers can store their data on single cloud, which has some drawbacks. First is vendor lock in problem and second is security on cloud. The solution to this problem is to store the data on different cloud server without redundancy using encryption algorithm. Customers do not want to lose their sensitive data on cloud. Another issue of cloud computing is data thievery should be overcome to supply higher service. Multi-cloud environment has ability to scale back security risks. To avoid security risk we offer framework. Keywords: Cloud computing, cloud storage, data hosting, data intrusion, multi-cloud, single cloud.
APA, Harvard, Vancouver, ISO, and other styles
4

Satyanarayan Kanungo and Saumya Sarangi. "Quantum computing integration with multi-cloud architectures: enhancing computational efficiency and security in advanced cloud environments." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 564–74. http://dx.doi.org/10.30574/wjaets.2024.12.2.0319.

Full text
Abstract:
The objective of this research is to explore the integration of quantum computing with multi-cloud architectures, aiming to enhance computational efficiency and security in advanced cloud environments. The study seeks to identify the potential benefits and challenges of incorporating quantum computing capabilities within a multi-cloud framework and to evaluate the impact on performance and security metrics. The research employs a hybrid methodological approach, combining both theoretical analysis and practical implementation. Initially, a detailed literature review is conducted to understand the current state of quantum computing and multi-cloud architectures. This is followed by the design and development of an integration framework that leverages quantum computing technologies in a multi-cloud environment. Key steps include developing a multi-cloud architecture that integrates quantum computing resources alongside classical computing resources, deploying quantum algorithms and protocols within the multi-cloud setup, implementing advanced security measures to protect data and computational processes, using a set of predefined metrics to evaluate computational efficiency and security, and employing statistical tools and techniques to analyze the collected data and draw meaningful insights. The integration of quantum computing with multi-cloud architectures resulted in significant improvements in computational efficiency, particularly in tasks that are traditionally resource-intensive. Key findings include enhanced computational speed, where quantum algorithms demonstrated superior performance in solving complex problems compared to classical algorithms, optimized resource utilization through dynamic allocation of quantum and classical resources leading to cost efficiency, improved security with quantum-enhanced protocols providing robust protection against cyber threats, and high scalability of the integrated architecture to accommodate increasing computational demands without compromising performance. The research concludes that integrating quantum computing with multi-cloud architectures offers substantial benefits in terms of computational efficiency and security. The findings indicate that such integration can revolutionize cloud computing, providing a powerful platform for handling complex computations and enhancing data security. However, the study also highlights several challenges, including the need for specialized hardware, the complexity of integration, and the necessity for ongoing research to fully harness the potential of quantum computing in cloud environments. Future research should focus on addressing these challenges and exploring further applications of quantum computing in various cloud-based scenarios.
APA, Harvard, Vancouver, ISO, and other styles
5

Nikhil, Bhagat. "Optimizing Performance, Cost-Efficiency, and Flexibility through Hybrid Multi-Cloud Architectures." Journal of Scientific and Engineering Research 11, no. 4 (2024): 372–79. https://doi.org/10.5281/zenodo.14273093.

Full text
Abstract:
Cloud Computing is the foundation of every modern company that is scalable, adaptable and economical. Hybrid multi-cloud environments, which combine private clouds, public clouds, and multiple cloud providers, represent the next generation for scaling cloud infrastructures. Hybrid cloud architecture lets organizations reap the security and control benefits of a private cloud while also taking advantage of the scalability and cost efficiency of a public cloud. Meanwhile, multi-cloud models avoid vendor lock-in, provide risk mitigation, and enable organizations to choose the best options from multiple providers. Hybrid and multi-cloud solutions together offer an integrated cloud architecture that maximizes usage, performance, and resilience. The paper delves into the advantages of hybrid and multi-cloud environments, including agility, cost efficiency and increased security. The paper also touches on organizational design considerations such as workload assignment, interoperability, security, and vendor selection. The paper provides guidelines for implementing hybrid multi-cloud environments where orchestration tools and automation play a vital role to facilitate the operations. Even though Hybrid multi-cloud architectures provide greater flexibility, they must be strategically designed, implemented and managed. By modernizing these environments, businesses can enhance performance, profitability, and agility, better preparing them to thrive in today’s competitive market.
APA, Harvard, Vancouver, ISO, and other styles
6

Adedamola Abiodun Solanke. "Zero trust security architectures for multi-cloud environments: Implementation strategies and measurable outcomes." World Journal of Advanced Engineering Technology and Sciences 3, no. 2 (2021): 122–34. https://doi.org/10.30574/wjaets.2021.3.2.0054.

Full text
Abstract:
According to current developments, organizations using AWS, Azure, and Google Cloud Platform for multi-cloud strategies have made perimeter security models obsolete. The modern Zero Trust Security Architecture (ZTSA) enables distributed cloud environment security through active access control verification, minimal privileges, and strict continuous verification. The research examines Zero Trust deployment across major cloud service providers before explaining consistent security frameworks and developing implementation guidelines. The program achieves a 95% security breach reduction rate while handling major obstacles like identifying complexities, access policies, identity fragmentation, and systems' expansion requirements. The discussion about Zero Trust in multi-cloud security covers AI-driven automation and post-quantum cryptography and security frameworks for serverless architectures, followed by a structured Zero.
APA, Harvard, Vancouver, ISO, and other styles
7

Manne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 7, no. 3 (2025): 74–82. https://doi.org/10.47941/ijce.2753.

Full text
Abstract:
Purpose: The purpose of this study is to examine the implementation of Zero Trust Architecture (ZTA) within multi-cloud environments, where traditional perimeter-based security models are increasingly inadequate. The paper aims to identify and address the unique security challenges posed by multi-cloud infrastructures, such as identity and access management (IAM), policy enforcement, network segmentation, and continuous monitoring. Methodology: The research analyzes established industry frameworks, notably NIST Special Publication 800-207, to provide a theoretical foundation for ZTA. It explores practical implementation strategies by evaluating real-world case studies and assessing technologies such as AI-driven threat detection, identity federation, and software-defined perimeters. Comparative analysis of cloud service provider tools and standardization techniques is also conducted to identify best practices for cross-cloud security. Findings: The study finds that implementing ZTA in multi-cloud environments significantly enhances security postures by minimizing attack surfaces and improving regulatory compliance. Effective integration of AI, federated identity solutions, and cloud-native security tools enables continuous verification and least privilege access control. Unique Contribution to Theory, Practice and Policy: The research concludes that while ZTA presents interoperability and policy enforcement challenges, these can be mitigated through standardized frameworks and automation, making ZTA a viable model for modern cloud security.
APA, Harvard, Vancouver, ISO, and other styles
8

Manne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 4, no. 3 (2023): 1–9. https://doi.org/10.47941/ijce.2754.

Full text
Abstract:
Purpose: The purpose of this study is to examine the implementation of Zero Trust Architecture (ZTA) within multi-cloud environments, where traditional perimeter-based security models are increasingly inadequate. The paper aims to identify and address the unique security challenges posed by multi-cloud infrastructures, such as identity and access management (IAM), policy enforcement, network segmentation, and continuous monitoring. Methodology: The research analyzes established industry frameworks, notably NIST Special Publication 800-207, to provide a theoretical foundation for ZTA. It explores practical implementation strategies by evaluating real-world case studies and assessing technologies such as AI-driven threat detection, identity federation, and software-defined perimeters. Comparative analysis of cloud service provider tools and standardization techniques is also conducted to identify best practices for cross-cloud security. Findings: The study finds that implementing ZTA in multi-cloud environments significantly enhances security postures by minimizing attack surfaces and improving regulatory compliance. Effective integration of AI, federated identity solutions, and cloud-native security tools enables continuous verification and least privilege access control. Unique Contribution to Theory, Practice and Policy: The research concludes that while ZTA presents interoperability and policy enforcement challenges, these can be mitigated through standardized frameworks and automation, making ZTA a viable model for modern cloud security.
APA, Harvard, Vancouver, ISO, and other styles
9

Rodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.

Full text
Abstract:
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.
APA, Harvard, Vancouver, ISO, and other styles
10

Muralidhara, Pavan, and Vaishnavi Janardhan. "Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments." International Journal of Scientific Research and Management (IJSRM) 4, no. 9 (2016): 4636–64. https://doi.org/10.18535/ijsrm/v4i9.22.

Full text
Abstract:
As organisations are deploying multiple clouds to scale, gain flexibility and cost optimisation the challenge of securing these architectures grows exponentially. Conventional logical security platforms that are based on perimeters cannot effectively guard current complex cloud environments. Currently, however, there is a need to develop methods for their implementation, which refers to the Zero Trust Architecture (ZTA) approach with the overall slogan “Never Trust, Always Verify”. This security model means that any user, device, and network request is authenticated, authorized and monitored all the time irrespective of the source. In multi-cloud where applications, data and computing resources are located across various cloud service providers, use of Zero Trust lowers the risks of threats and cyber-attacks by minimizing the exposures that bad actors can exploit, and hardening control of entry to assets. Drawing on theory and research, this paper considers the advantages and disadvantages of the Zero Trust model, the processes that need to be completed to introduce it to the multi-cloud infrastructure, and possible case studies. Hence, Identity and Access Management, Micro-segmentation, and continuous monitoring can help the organization enhance the cloud security posture, and minimize compliance and risks related to sophisticated cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
11

Rishi Kumar Sharma. "Multi-Tenant Architectures in Modern Cloud Computing: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 307–17. https://doi.org/10.32628/cseit25111236.

Full text
Abstract:
This comprehensive article explores the evolution and implementation of multi-tenant architectures in modern cloud computing environments, focusing on their role in Software-as-a-Service solutions. The article examines how these architectures enable efficient resource sharing while maintaining strict data isolation among tenants. This article demonstrates how integrating AI-driven observability frameworks and advanced security mechanisms, such as IAM and KMS, can improve scalability by 70% and reduce operational costs by 60%, offering practical solutions to modern multi-tenant architecture challenges. The article delves into core technical components, including data layer implementation and compute layer architecture, while analyzing advanced security measures and AI-driven observability frameworks. Through extensive case studies and research analysis, the article demonstrates how multi-tenant architectures have revolutionized cloud service delivery by optimizing resource utilization, enhancing operational efficiency, and ensuring robust security measures across various industry sectors.
APA, Harvard, Vancouver, ISO, and other styles
12

Dong, Zhao Yang, and Lin Zhang. "A Comprehensive Security Strategy Applying to the Total Life Cycle of Cloud Computing Data Center." Applied Mechanics and Materials 556-562 (May 2014): 6259–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6259.

Full text
Abstract:
Aiming at the security issues of cloud computing data center, the systematic security construction architecture of cloud computing data center is proposed. By surrounding the key aspects of security construction, such as infrastructure security, virtual security, cloud authentication and authorization, data isolation and protection, cloud platform and cloud service security, security operation maintenance, cloud computing platform migration, and disaster recovery backup, the security architecture constructs a multi-level, multi-angle tridimensional defense system in depth. It ensures the life cycle security for resource services of the cloud computing data center. Many key problems are further discussed in detail, such as the problem of data storage security, security domain isolation, cloud computing platform tenants accessing, and terminal accessing. This paper provides reference for the security construction of cloud computing data center, and gives guide to the implementation of the relevant security measures.
APA, Harvard, Vancouver, ISO, and other styles
13

Thakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.

Full text
Abstract:
With the growing reliance on cloud computing for storing and managing data, providing security and performance for cloud storage systems has become very important and multicloud solutions offers both. Current cloud architectures suffer from scalability, security, and efficiency issues in distributed cloud systems. In this paper, we introduce a ChaCha20-encryption, a fast stream cipher and Blake3, an adaptive cryptographic hash function, and dynamic chunk allocation to an existing architecture that progressively improves data confidentiality, integrity, and redundancy. The experiment focuses on the system's performance relative to Four Tier Secure Cloud Storage Architecture, which utilizes AES, MD5 hashing, and static chunk allocation strategies for data storage. To ensure a balance between performance while offering the security this architecture implements ChaCha20 which is fast and resistant to side-channel attack – making it ideal for modern multi cloud deployments. Experiments show that this new architecture is faster, more lightweight and adaptable than existing model.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.

Full text
Abstract:
The subject of the study is is the security architecture of the Internet of Things (IoT) based on fog computing, which allows providing efficient and secure services for many IoT users. The goal is to investigate the security architecture for IoT systems based on fog computing. To achieve the goal, the following tasks were solved: the concept of fog computing is proposed, its architecture is considered and a comparative analysis of fog and cloud computing architectures is made; the principles of designing and implementing the architecture of a fog computing system are outlined; multi-level security measures based on fog computing are investigated; and the areas of use of fog computing-based Internet of Things networks are described. When performing the tasks, such research methods were used as: theoretical analysis of literature sources; analysis of the principles of designing and implementing the security architecture of the Internet of Things; analysis of security measures at different levels of the architecture. The following results were obtained: the architecture of fog computing is considered and compared with the cloud architecture; the principles of designing and implementing the architecture of fog computing systems are formulated; multi-level IoT security measures based on fog computing are proposed. Conclusions: research on IoT security systems based on fog computing has important theoretical implications. The fog computing architecture, in contrast to the cloud architecture, better meets the demand for high traffic and low latency of mobile applications, providing more advantages for systems that require real-time information processing. When designing and implementing the architecture of fog computing systems, the factors of memory capacity, latency, and utility should be taken into account to effectively integrate fog technologies with IoT. To ensure a high level of system security, multi-level security measures should be implemented using both software and hardware solutions.
APA, Harvard, Vancouver, ISO, and other styles
15

Naga Swetha Kattula. "Next-Gen Cloud: The future of secure and seamless cross-platform integrations." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1302–8. https://doi.org/10.30574/wjarr.2025.26.1.1090.

Full text
Abstract:
The rapid evolution of enterprise cloud computing has necessitated innovative architectural approaches to address the complexities of multi-cloud environments while maintaining robust security. This article explores transformative technologies reshaping cross-platform integrations in modern cloud ecosystems. The convergence of AI-driven API management platforms has revolutionized the governance and security aspects of cloud integration, enabling organizations to achieve unprecedented operational efficiencies. Confidential Computing represents a paradigm shift in data security, utilizing hardware-based Trusted Execution Environments to maintain data encryption during processing, thereby addressing critical privacy concerns for regulated industries. Zero Trust Architecture provides a comprehensive security framework that transcends traditional perimeter-based models, implementing continuous verification mechanisms across distributed cloud resources. Event-driven Architectures deliver the real-time integration capabilities essential for responsive business operations across geographically dispersed systems. Together, these technologies create a foundation for secure, seamless cross-platform integration that empowers enterprises to leverage the strategic advantages of multi-cloud deployments while mitigating associated risks. The article provides quantitative insights into implementation benefits spanning operational efficiency, security posture, compliance management, and economic impact, demonstrating how these technologies collectively enable organizations to achieve the agility required in today's dynamic business environment.
APA, Harvard, Vancouver, ISO, and other styles
16

Mathew Sebastian. "Multi-Layer Security Architecture for Cloud-Connected Autonomous Systems." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 798–803. https://doi.org/10.32996/jcsts.2025.7.3.87.

Full text
Abstract:
This article presents a comprehensive framework for implementing multi-layer security in cloud-connected autonomous systems, focusing on the critical aspects of data protection and system integrity. The article examines various security components including telemetry data management, endpoint security architecture, Electronic Control Unit (ECU) protection, data protection strategies, and network security infrastructure. Through analysis of multiple autonomous vehicle deployments and real-world implementations, the article demonstrates the effectiveness of integrated security approaches incorporating encryption, authentication, and real-time monitoring mechanisms. The article highlights the importance of comprehensive security measures in maintaining operational safety and preventing unauthorized access while ensuring optimal system performance in autonomous vehicle networks.
APA, Harvard, Vancouver, ISO, and other styles
17

Swati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.

Full text
Abstract:
Although multi-tenant cloud infrastructures are more cost-effective and scalable, they also raise serious security issues, especially with regard to insider threats and data breaches. The security and integrity of data are seriously threatened by these dangers, which come from authorised users. By examining potential insider threats, risk factors, and mitigation techniques, this study investigates the vulnerabilities present in multi-tenant cloud infrastructures. To improve cloud security, a multi-layered security architecture is suggested, incorporating enhanced access control mechanisms, behavioral analytics, and Zero Trust Architecture. Moreover, encryption, continuous monitoring, and employee awareness programs are also discussed as mandatory elements for risk mitigation. With the implementation of proactive security measures, organizations can solidify their defenses against new cyber threats and maintain safe cloud operations.
APA, Harvard, Vancouver, ISO, and other styles
18

Mugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes." International Journal of Information Security and Privacy 11, no. 1 (2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.

Full text
Abstract:
In cloud storage systems, data security management is becoming a serious matter. Big data and accessibility power is increasingly high, though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. As a result, cloud storage security has become one of the driving components in Cloud Computing regarding to data manipulation trust on both hosting center and on-transit. This paper proposes a TPM-Based Security over Multi-Cloud Storage Architecture (MCSA) grounded on Erasure Codes to apply root of trust based on hardware authenticity. An erasure codes such as Reed-Solomon, is capable of assuring stability in storage costs with best practice to guarantee data accessibility failure recovery. A Multi-Cloud Control Node manages other Control Nodes evolved in the cloud; this work introduces TPM-Based Security functions per Control node in the architecture. This concept will resolve a number of storage security issues, hence Cloud Computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
19

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in multi-clouds; one at the client side, and other at the server side. The article presented a security domination outline for multi-clouds and supports security needs like Confidentiality, Integrity, Availability, Authorization, and Non-repudiation for cloud storage. Through this document we have anticipated, HBDaSeC, a secure-computation protocol to ease the challenges of enforcing the protection of data for information security in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
20

Sai Teja Battula. "A Comprehensive Framework for Evaluating the Scalability and Security of Fintech Web Applications in a Cloud-Native Environment." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1940–50. https://doi.org/10.32628/cseit23112567.

Full text
Abstract:
This article presents a comprehensive framework for evaluating and designing cloud-native fintech applications that balance scalability requirements with robust security postures. As financial institutions increasingly migrate to cloud environments, they face complex challenges at the intersection of technological innovation, regulatory compliance, and cybersecurity. The article examines core architectural considerations, including scalability patterns like microservices and event-driven design, alongside essential security frameworks such as zero-trust architecture and defense-in-depth strategies. It explores cloud-native deployment approaches through container orchestration and serverless architectures while addressing specific challenges related to latency management, multi-tenancy considerations, and data sovereignty requirements. The article provides systematic metrics for assessing fintech architectures across three critical dimensions: scalability metrics to measure performance under varying conditions, security posture evaluations to ensure comprehensive threat mitigation and operational excellence indicators to maintain service reliability. It enables financial institutions to build resilient, compliant, and efficient cloud-native applications that adapt to evolving market demands and regulatory landscapes.
APA, Harvard, Vancouver, ISO, and other styles
21

Segun Adanigbo, Oluwasanmi, Bolaji Iyanu Adekunle, Ejielo Ogbuefi, Oyejide Timothy Odofin, Oluwademilade Aderemi Agboola, and Denis Kisina. "Implementing Zero Trust Security in Multi-Cloud Microservices Platforms: A Review and Architectural Framework." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2402–9. https://doi.org/10.62225/2583049x.2024.4.6.4357.

Full text
Abstract:
The widespread adoption of multi-cloud infrastructures and microservices architectures has redefined enterprise computing by enhancing scalability, modularity, and service delivery. However, this decentralization has also introduced expanded threat surfaces and complex security challenges that traditional perimeter-based models can no longer address effectively. This paper presents a comprehensive review and a proposed architectural framework for implementing Zero Trust Security (ZTS) in multi-cloud microservices environments. Beginning with a synthesis of existing literature and industry best practices, the study identifies critical vulnerabilities and limitations in current security approaches. It then explores the foundational principles of Zero Trust—including least privilege, continuous verification, and identity-centric access control—and how they apply within distributed cloud-native systems. The proposed framework incorporates core security components such as identity and access management, centralized policy engines, micro-segmentation, and service mesh integration to enable fine-grained, context-aware access enforcement. Designed for cloud-agnostic compatibility, the architecture facilitates secure workload mobility and dynamic service discovery across heterogeneous environments. Practical considerations, including performance impact, interoperability challenges, and governance implications, are also discussed. Although the framework offers a strategic path toward resilient multi-cloud security, it acknowledges limitations in empirical validation and implementation variability. The paper concludes by recommending future research directions in adaptive trust scoring, AI-driven policy enforcement, and Zero Trust extensions to edge-cloud systems, thus contributing to the ongoing evolution of secure cloud-native computing.
APA, Harvard, Vancouver, ISO, and other styles
22

Yalate, Arunkumarreddy. "Demystifying Multi-Cloud Architecture: Foundational Concepts and Design Patterns." European Journal of Computer Science and Information Technology 13, no. 24 (2025): 51–62. https://doi.org/10.37745/ejcsit.2013/vol13n245162.

Full text
Abstract:
Multi-cloud architecture has emerged as a pivotal strategy for organizations seeking to enhance resilience, prevent vendor lock-in, and meet diverse compliance requirements. This strategic approach integrates services from multiple cloud providers while addressing critical aspects of workload distribution, networking, identity management, and security. Through the implementation of Infrastructure as Code and containerization, organizations can achieve standardized deployments and efficient orchestration across cloud providers. The architecture incorporates robust security frameworks and governance models, ensuring consistent policy enforcement and resource management. Best practices in multi-cloud implementations emphasize standardization, monitoring, failure planning, and complexity management, leading to optimized operations and enhanced business value.
APA, Harvard, Vancouver, ISO, and other styles
23

.Nishchitha TS, Prof. "A Secure Approach for Multicloud Environment." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48917.

Full text
Abstract:
Abstract The adoption of multi-cloud environments—where organizations leverage services from multiple cloud providers—has grown significantly due to the demand for increased flexibility, redundancy, and cost optimization. However, this paradigm introduces complex security challenges, including data privacy, access control, inter-cloud communication risks, and compliance management. This paper presents a secure approach for managing and protecting data and services in a multi-cloud architecture. The proposed framework integrates encryption, federated identity management, policy-based access control, and secure communication protocols to mitigate potential threats. It also emphasizes the role of automation and continuous monitoring to enforce consistent security policies across heterogeneous cloud platforms. Experimental analysis and threat modeling demonstrate that the proposed approach significantly enhances data confidentiality, integrity, and system resilience in multi-cloud deployments. This work contributes toward building more robust, scalable, and secure cloud strategies for enterprise and government applications. 1. Keywords: Multi-Cloud Security, 2. Cloud Computing, 3. Data Privacy, 4. Access Control, 5. Encryption, 6. Federated Identity Management, 7. Secure Communication, 8. Cloud Compliance, 9. Threat Mitigation, 10. Cloud Infrastructure, 11. Cloud Integration, 12. Policy Enforcement, 13. Cybersecurity, 14. Cloud Risk Management, 15. Cloud Security Architecture
APA, Harvard, Vancouver, ISO, and other styles
24

Ravikanth Reddy Gudipati. "Implementing a multi-tenant FIDO relying party server: Architecture, security, and scalability considerations." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 765–73. https://doi.org/10.30574/wjaets.2025.15.1.0304.

Full text
Abstract:
The transition to passwordless authentication using FIDO standards marks a transformative shift in modern security architecture, particularly in multi-tenant environments. This technical exploration delves into the comprehensive implementation considerations for building robust multi-tenant FIDO Relying Party (RP) servers. The content addresses key architectural components, including WebAuthn and CTAP protocol integration, database architecture models, tenant isolation strategies, and identity federation mechanisms. Critical security aspects, including cross-tenant protection and audit logging, are examined alongside cloud-native deployment considerations. The discussion encompasses essential elements of scalability, maintainability, and security controls required for successful FIDO-based passwordless authentication in multi-tenant environments.
APA, Harvard, Vancouver, ISO, and other styles
25

Pashikanti, Santosh. "Proactive Threat Detection in Cloud Ecosystems: SIEM, Monitoring, and Automated Remediation." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–7. https://doi.org/10.55041/isjem01417.

Full text
Abstract:
In modern cloud ecosystems, the stakes are higher than ever for proactive threat detection and rapid incident response. As organizations embrace multi-cloud and hybrid environments, traditional security controls must evolve to protect distributed workloads and data. Security Information and Event Management (SIEM) platforms, continuous monitoring, and automated remediation mechanisms form the backbone of a robust, proactive security strategy. This white paper delves into the technical underpinnings of these solutions, highlighting architectural components, methodologies, and implementation considerations. This paper examines various challenges such as scale, heterogeneous data sources, and advanced attack vectors, along with corresponding solutions. In addition, explores real-world case studies that demonstrate the viability and effectiveness of implementing SIEM, monitoring, and automated remediation strategies in production environments. Keywords: Threat Detection, Cloud Security, SIEM, Continuous Monitoring, Automated Remediation, Hybrid Cloud, Multi-Cloud, Architecture, Implementation
APA, Harvard, Vancouver, ISO, and other styles
26

Martins, Joberto S. B., Tereza C. Carvalho, Rodrigo Moreira, et al. "Enhancing Network Slicing Architectures with Machine Learning, Security, Sustainability and Experimental Networks Integration." IEEE ACCESS 11 (July 6, 2023): 1–20. https://doi.org/10.1109/ACCESS.2023.3292788.

Full text
Abstract:
Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies, mobile edge computing, mobile cloud computing, and verticals like the Internet of Vehicles and industrial IoT, among others. NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications since it allows the optimization and customization of scarce and disputed resources among dynamic, demanding clients with highly distinct application requirements. Various standardization organizations, like 3GPP's proposal for new generation networks and state-of-the-art 5G/6G research projects, are proposing new NS architectures. However, new NS architectures have to deal with an extensive range of requirements that inherently result in having NS architecture proposals typically fulfilling the needs of specific sets of domains with commonalities. The Slicing Future Internet Infrastructures (SFI2) architecture proposal explores the gap resulting from the diversity of NS architectures target domains by proposing a new NS reference architecture with a defined focus on integrating experimental networks and enhancing the NS architecture with Machine Learning (ML) native optimizations, energy-efficient slicing, and slicing-tailored security functionalities. The SFI2 architectural main contribution includes the utilization of the slice-as-a-service paradigm for end-to-end orchestration of resources across multi-domains and multi-technology experimental networks. In addition, the SFI2 reference architecture instantiations will enhance the multi-domain and multi-technology integrated experimental network deployment with native ML optimization, energy-efficient aware slicing, and slicing-tailored security functionalities for the practical domain.
APA, Harvard, Vancouver, ISO, and other styles
27

Tang, Jian Gang. "The Research on Cloud Computing Security Model and Countermeasures." Applied Mechanics and Materials 511-512 (February 2014): 1196–200. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1196.

Full text
Abstract:
Cloud computing is an open structure which have complexity, on-demand services, virtualization, resource pooling, rapid elasticity and multi-tenant architecture, etc. The security issues have become a bottleneck restricting the development of cloud computing. This paper analyzes the characteristics of cloud computing services, security requirements and security issues, given security strategies and a cloud computing model. It requires the use of cloud computing architecture data centers, virtualization platforms, cloud services, cloud terminal interfaces and cloud terminal to establish a secure cloud computing model. It needs considerations from prevention, surveillance and response to ensure the implementation and management. Cloud computing security is not just technical issues, it also involves many standardization, regulatory approach, laws and regulations and follow the existing security best practices can enhance the security of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
28

Vikas, Prajapati. "Cloud-Based Database Management: Architecture, Security, challenges and solutions." Journal of Global Research in Electronics and Communications (JGREC) 1, no. 1 (2025): 07–13. https://doi.org/10.5281/zenodo.14934833.

Full text
Abstract:
The rapid evolution of cloud computing has revolutionized database management, offering scalable, flexible, and cost-effective solutions for managing large volumes of data. Cloud computing has transformed database management by providing scalable, flexible, and cost-effective solutions for handling massive volumes of data. Cloud-Based Database Management Systems (CDBMS) eliminate the need for extensive on-premise infrastructure, enabling organizations to focus on core operations. These systems leverage advanced architectures, including layered designs that enhance scalability, interoperability, and fault tolerance, ensuring efficient data management. However, adopting cloud databases brings significant challenges, such as data security, multi-tenancy vulnerabilities, and achieving seamless scalability. This paper examines the architecture of CDBMS, highlighting its modular components and their role in maintaining data integrity, access control, and availability. Security challenges, including authentication, encryption, and misconfigurations, are analyzed alongside their implications for data privacy and operational resilience. Emerging solutions such as AI-driven database technologies, edge computing integration, and hybrid cloud strategies are explored to address these challenges. Additionally, the study evaluates the growing role of automation and orchestration tools in optimizing cloud operations by providing a comprehensive review of CDBMS architecture, security concerns, and innovative solutions.
APA, Harvard, Vancouver, ISO, and other styles
29

., Kalyani M. Borse. "SECURITY IN MULTI-CLOUD DATA STORAGE WITH SIC ARCHITECTURE." International Journal of Research in Engineering and Technology 03, no. 02 (2014): 81–84. http://dx.doi.org/10.15623/ijret.2014.0302015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kalyashina, Anna, Yuri Smirnov, Valeriy Esov, Maxim Kuznetsov, and Oksana Dmitrieva. "Enhancing IoT systems through Cloud-Fog-Edge architectures challenges and opportunities." E3S Web of Conferences 583 (2024): 06012. http://dx.doi.org/10.1051/e3sconf/202458306012.

Full text
Abstract:
This article examines the deployment and implications of Cloud- Fog-Edge architectures in Internet of Things (IoT) systems, highlighting their significance in enhancing data management and system security across diverse sectors. As IoT ecosystems expand, the necessity for architectures that efficiently handle large volumes of data and ensure real-time processing capabilities becomes paramount. The Cloud-Fog-Edge architecture addresses these needs by distributing computing resources across three layers—cloud, fog, and edge—each optimized for specific tasks within the IoT workflow. We discuss the challenges and solutions associated with interoperability in such multi-layered systems, emphasizing the need for standardized communication protocols and data formats to facilitate seamless interactions between heterogeneous devices and platforms. Furthermore, the article delves into the critical aspects of security within these architectures, outlining strategies for robust data encryption, access management, regular security updates, and comprehensive network activity monitoring to safeguard against unauthorized access and cyber threats. The integration of Cloud-Fog-Edge architectures not only promises enhanced operational efficiency and scalability but also significantly boosts the adaptability of IoT systems to meet evolving technological and operational demands. By providing a detailed analysis of the functionalities, integration challenges, and security practices associated with each architectural layer, this article contributes to a deeper understanding of how Cloud-Fog-Edge frameworks can be optimized to bolster the reliability, efficiency, and security of modern IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
31

Fan, Yi Jie, Zhen Qiao, and Ming Zhong Xiao. "One Cloud: A Secure and Anonymous Multi-Cloud Oblivious Storage Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5591–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5591.

Full text
Abstract:
We present a cross-cloud storage architecture that protects both user’s data and privacy from cloud providers or potential adversaries by leveraging the concept of Oblivious RAM on a logical layer. Our architecture allows users to conceal reading/writing operations and access sequences from clouds in order to prevent the leakage of access patterns, which may be a threat to data security. In addition, an anonymity preserving mechanism applied in our architecture makes it difficult to track users' data or confirm users' identities, which can effectively protect users' privacy. One Cloud, the proof-of-concept prototype of our architecture integrates four major cloud storage services and implements all key techniques we proposed in our architecture. We deploy it in a real-world network environment to analyze and evaluate the performance and the scalability of our architecture.
APA, Harvard, Vancouver, ISO, and other styles
32

Girish Poojar. "The Evolution of Cloud Computing: Key Trends Shaping the Next Decade." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3215–23. https://doi.org/10.32628/cseit251112340.

Full text
Abstract:
This technical article examines the transformative trends shaping cloud computing adoption over the next decade. The article explores key developments, including the rise of hybrid and multi-cloud architectures, integration of artificial intelligence and machine learning capabilities, advancement of edge computing solutions, enhancement of security frameworks, and emergence of sustainable computing initiatives. The article demonstrates how these innovations are fundamentally changing how organizations approach their technology infrastructure, highlighting improvements in operational efficiency, security posture, and environmental sustainability. The article provides insights into technical implications for organizations, emphasizing the importance of architecture modernization, security enhancement, and operational excellence in achieving successful cloud transformation.
APA, Harvard, Vancouver, ISO, and other styles
33

Sachin Kumar. "The Rise of Multi-Cloud Architecture: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2836–43. https://doi.org/10.32628/cseit251112305.

Full text
Abstract:
Multi-cloud architecture has emerged as a transformative approach in modern enterprise computing, fundamentally changing how organizations deploy, manage, and scale their digital infrastructure. This technical article examines the evolution of multi-cloud strategies, exploring the key drivers behind their adoption and the enabling technologies that make them possible. The article investigates the critical role of containerization and orchestration in achieving workload portability, while also analyzing the impact of service discovery, networking solutions, and infrastructure as code practices. The article further explores emerging trends in financial management, networking advancements, and compliance frameworks that are shaping the future of multi-cloud implementations. Through comprehensive analysis, this article demonstrates how multi-cloud architectures enable organizations to enhance operational efficiency, improve security posture, and maintain regulatory compliance while avoiding vendor lock-in.
APA, Harvard, Vancouver, ISO, and other styles
34

Chimakurthi, Venkata Naga Satya Surendra. "The Challenge of Achieving Zero Trust Remote Access in Multi-Cloud Environment." ABC Journal of Advanced Research 9, no. 2 (2020): 89–102. http://dx.doi.org/10.18034/abcjar.v9i2.608.

Full text
Abstract:
Zero-trust security models and architectures have recently increased in adoption due to several variables, such as the widespread use of off-premises cloud technologies, variety in IT devices, and diffusion in the Internet of Things (IoT). Users, devices, apps, and networks are all assumed to be untrustworthy in this approach, which is built on the idea of various tiers of Trust and authentication. Cybersecurity paradigms are developing, and the term "zero trust" describes the shift from static network perimeters to protecting people, things, and resources. Economic and enterprise architecture and processes can be designed using zero trust principles. In the idea of zero Trust, assets or user accounts are thought to have no implicit confidence because of their physical or network location (Internet vs local networks) or asset ownership (enterprise or personally owned). Authentication and authorization must be conducted before a connection to an organizational resource can be established. There are many different types of Cloud, including several public, private, hybrid, and on-premises. For data centers, a multi-cloud deployment strategy includes many different public cloud service providers instead of relying on a private cloud or on-premises architecture. Hybrid multi-cloud is a multi-cloud implementation that incorporates all public and private clouds and on-premises technology. This paper discusses the zero-trust security model for multi-cloud environments and applications and the obstacles to implementing it.
APA, Harvard, Vancouver, ISO, and other styles
35

Ramadevi Sannapureddy. "Cloud-Native Enterprise Integration: Architectures, Challenges, and Best Practices." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 167–73. https://doi.org/10.32996/jcsts.2025.7.5.22.

Full text
Abstract:
Cloud-native enterprise integration represents a transformative shift from monolithic middleware to distributed, loosely-coupled architectures that enable organizations to achieve greater business agility and operational efficiency. This article examines the architectural patterns, challenges, and best practices for successful cloud-native integration implementations. By leveraging event-driven architectures, API-first approaches, service meshes, and hybrid integration models, enterprises can create flexible, resilient integration solutions that support modern business requirements. However, these benefits come with significant challenges related to distributed systems complexity, security vulnerabilities, vendor lock-in concerns, legacy system integration, and performance considerations. Through the adoption of DevOps practices, comprehensive observability strategies, container orchestration, robust API security, resilience engineering, and multi-cloud optimization techniques, organizations can overcome these challenges and realize the full potential of cloud-native integration. The implementation framework presented provides a practical roadmap for organizations at any stage of their cloud-native journey, encompassing assessment, architecture definition, platform selection, governance establishment, and iterative implementation. By following this structured approach, enterprises can successfully navigate the complexities of modern integration landscapes and deliver tangible business value through their cloud-native initiatives.
APA, Harvard, Vancouver, ISO, and other styles
36

Zkik, Karim, Ghizlane Orhanou, and Said El Hajji. "Secure Mobile Multi Cloud Architecture for Authentication and Data Storage." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 62–76. http://dx.doi.org/10.4018/ijcac.2017040105.

Full text
Abstract:
The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resources and calculation power. So, Mobile Cloud Computing allows users to fully utilize mobile technologies to store, to download, share and retrieve their personal data anywhere and anytime. As many recent researches show, the main problem of fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation through internet that many security problems emerged and sparked the interest of the attackers. To face all this security problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a recovery mechanism to secure access for mobile users to the remote multi cloud servers. We also provide an implementation of our framework to demonstrate its robustness and efficiently, and a security analysis.
APA, Harvard, Vancouver, ISO, and other styles
37

Sunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Revolutionizing data center security: Conceptualizing a unified security framework for hybrid and multi-cloud data centers." Open Access Research Journal of Science and Technology 5, no. 2 (2022): 086–76. https://doi.org/10.53022/oarjst.2022.5.2.0065.

Full text
Abstract:
The rapid shift towards hybrid and multi-cloud environments has introduced significant security challenges for data centers, as traditional security models struggle to meet the demands of modern infrastructures. This review conceptualizes a unified security framework aimed at revolutionizing data center security in the context of hybrid and multi-cloud architectures. The proposed framework integrates on-premise and cloud security controls into a cohesive, scalable solution that addresses the complexities of modern data centers, ensuring robust protection against increasingly sophisticated cyber threats. At the core of the framework is a centralized security management platform that enables real-time monitoring, policy enforcement, and incident response across diverse environments. The integration of Zero Trust Architecture ensures that security is applied rigorously, with continuous authentication and authorization for all access requests, irrespective of the user's location. Additionally, the framework leverages artificial intelligence (AI) and machine learning (ML) to enhance threat detection and response capabilities. AI-driven analytics enable the identification of anomalous activities, vulnerability scanning, and predictive threat intelligence, offering faster and more accurate responses to emerging security threats. The framework also emphasizes data protection through advanced encryption methods, securing sensitive information both in transit and at rest across hybrid and multi-cloud environments. Automated compliance management tools ensure that data centers remain compliant with industry standards and regulations, such as GDPR and CCPA, through continuous monitoring and real-time auditing. By incorporating automation, the framework reduces operational complexity, minimizing human error and ensuring consistency in policy enforcement across various platforms. This unified security framework promises to enhance the security posture of hybrid and multi-cloud data centers, reduce operational overhead, and improve compliance management, ultimately providing organizations with a scalable, adaptable, and proactive solution for safeguarding their digital infrastructure in an increasingly complex cyber landscape.
APA, Harvard, Vancouver, ISO, and other styles
38

Baladari, Venkata. "Cloud Resiliency Engineering: Best Practices for Ensuring High Availability in Multi-Cloud Architectures." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 2062–67. https://doi.org/10.21275/SR220610115023.

Full text
Abstract:
Ensuring cloud resiliency through engineering is essential for maintaining high availability, fault tolerance, and disaster recovery within contemporary cloud infrastructures. As more businesses move towards multi - cloud environments, maintaining system reliability and efficiency while also controlling costs takes centre stage. This study delves into optimal strategies for bolstering cloud reliability via automated failover systems, real - time data duplication, load distribution, and self - restoring networks. The analysis focuses on strategies for disaster recovery, cost - effective resource management, and enhancing security resilience to minimize potential risks.The report draws attention to the difficulties involved in integrating multiple cloud systems, maintaining data consistency, and dealing with cyber threats. It also explores the development of new technologies like AI - powered automation, edge computing, and predictive analytics for identifying potential failures. The study offers valuable insights into how to optimally configure cloud infrastructure to achieve the highest levels of efficiency and dependability. Future developments in autonomous cloud systems, quantum encryption, and eco-friendly computing models to enhance cloud robustness. This paper provides a detailed guide for companies seeking to construct reliable cloud infrastructure that maintains operational stability and reduces the frequency of service interruptions.
APA, Harvard, Vancouver, ISO, and other styles
39

Mamidi, Sundeep Reddy. "Securing Multi-Cloud Architectures: A Machine Learning Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 233–47. http://dx.doi.org/10.60087/jaigs.v2i1.160.

Full text
Abstract:
Multi-cloud computing, the utilization of multiple cloud computing services in a single heterogeneous architecture, has gained significant traction in recent years due to its potential for enhancing flexibility, resilience, and performance. This paper provides an overview of multi-cloud computing, exploring its key concepts, advantages, challenges, and best practices. It examines the motivations behind adopting multi-cloud strategies, the various deployment models, management approaches, and emerging trends. Additionally, the paper discusses the implications of multi-cloud computing for security, interoperability, and vendor lock-in. Through a comprehensive analysis, this paper aims to offer insights into the complexities and opportunities associated with multi-cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
40

Benkhelifa, Elhadj, Dayan Abishek Fernando, and Thomas Welsh. "A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization." International Journal of Cloud Applications and Computing 3, no. 3 (2013): 34–49. http://dx.doi.org/10.4018/ijcac.2013070103.

Full text
Abstract:
This paper is presented as part of a collaborative research project to develop a complex Cloud Service Delivery Platform (CSDP). The aim of the project is to develop a new disruptive approach for service provision to enable the creation of new value chains via Cloud Technology. This paper is primarily concerned with designing and implementing a novel Multi-tenancy architecture which supports a proposed hybrid authentication mechanism for greater resource optimization with enhanced security. The contribution of this paper is three-fold. First, it provides the reader with a concise classification of security concerns together with some developed concepts namely; Security-Aware cloud platform and a Cloud Adoption Model. Second, it proposes a hybrid authentication approach, coupling Single-Sign-On (SSO) with multi-factor authentication to enable improved security for Cloud federated access. Third, is to design and implement an integrated architecture enabling this hybrid authentication solution in a multi-tenancy setting. To the best of the authors knowledge, this work has not been attempted before and is unprecedented.
APA, Harvard, Vancouver, ISO, and other styles
41

Omoniyi Babatunde Johnson, Jeremiah Olamijuwon, Emmanuel Cadet, Olajide Soji Osundare, and Zein Samira. "Designing multi-cloud architecture models for enterprise scalability and cost reduction." Open Access Research Journal of Engineering and Technology 7, no. 2 (2024): 101–13. http://dx.doi.org/10.53022/oarjet.2024.7.2.0061.

Full text
Abstract:
Designing multi-cloud architecture models has become a critical strategy for enterprises seeking scalability and cost reduction in their cloud operations. Multi-cloud environments, which involve the use of multiple cloud service providers (CSPs), offer businesses the flexibility to optimize performance, improve resource allocation, and mitigate risks such as downtime, vendor lock-in, and service interruptions. This review explores the design principles and best practices for creating multi-cloud architectures that enhance enterprise scalability while simultaneously driving cost efficiencies. By leveraging the strengths of various CSPs such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud businesses can tailor their infrastructure to meet specific workload requirements and capitalize on competitive pricing models, ensuring better resource utilization and reducing the risk of under or over-provisioning. Scalability in multi-cloud architectures is achieved by implementing load balancing, auto-scaling, and failover mechanisms across multiple platforms. These systems can dynamically allocate resources in response to fluctuating demand, ensuring high availability and optimized performance. Additionally, the review discusses the key technologies that enable multi-cloud management, such as cloud management platforms (CMPs), containerization, and orchestration tools like Kubernetes, which help streamline operations and simplify the complex task of managing resources across disparate cloud environments. Cost reduction in multi-cloud is achieved by optimizing resource usage, selecting the right pricing models (e.g., on-demand, reserved, or spot pricing), and automating scaling and resource management. The review also highlights the importance of adopting security best practices to manage data privacy and compliance across multiple clouds. Finally, the review presents real-world case studies that demonstrate the tangible benefits of multi-cloud strategies, illustrating how enterprises can scale operations effectively while reducing infrastructure costs. This research underscores the transformative potential of multi-cloud architectures in modern enterprise environments, emphasizing their role in achieving business agility, cost optimization, and operational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
42

Yakoob, S. K., and V. Krishna Reddy. "Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments." International Journal of e-Collaboration 19, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijec.316771.

Full text
Abstract:
Distributed computing is a forceful idea in disseminated registering which depicts versatile information to the executives for a minimal price dependent on client interest to various business associations. Because of multi-cloud identity-based encryption over distributed environment, in this document, the authors present and implement a novel identity-based multi-cloud security access control approach (NIMSACPA) for efficient security in multi data security and privacy based on three basic parametric concepts: 1) open minded security between autonomous user privacy using Byzantine protocol, 2) to classify the security privileges with respect to multi-cloud data sharing is described using DepSky Architecture, and 3) for identity-based information distribution between diverse users in CC described using Shamir secret key sharing procedure. This execution gives better and critical execution as far as data stockpiling and information investigation contrast and existing cryptographic techniques alongside practical multi-cloud information.
APA, Harvard, Vancouver, ISO, and other styles
43

Mikail, Abdullahi, and Bernardi Pranggono. "Securing Infrastructure-as-a-Service Public Clouds Using Security Onion." Applied System Innovation 2, no. 1 (2019): 6. http://dx.doi.org/10.3390/asi2010006.

Full text
Abstract:
The shift to Cloud computing has brought with it its specific security challenges concerning the loss of control, trust and multi-tenancy especially in Infrastructure-as-a-Service (IaaS) Cloud model. This article focuses on the design and development of an intrusion detection system (IDS) that can handle security challenges in IaaS Cloud model using an open source IDS. We have implemented a proof-of-concept prototype on the most deployed hypervisor—VMware ESXi—and performed various real-world cyber-attacks, such as port scanning and denial of service (DoS) attacks to validate the practicality and effectiveness of our proposed IDS architecture. Based on our experimental results we found that our Security Onion-based IDS can provide the required protection in a reasonable and effective manner.
APA, Harvard, Vancouver, ISO, and other styles
44

Alok Sarkar. "Oracle cloud ecosystem: A technical deep dive into key technologies." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1724. https://doi.org/10.30574/wjarr.2025.26.1.1222.

Full text
Abstract:
The Oracle Cloud Ecosystem represents a comprehensive suite of integrated cloud technologies designed to meet modern enterprise requirements. This technical article delves into Oracle Cloud Infrastructure's architecture, autonomous database capabilities, integration frameworks, and advanced analytics features. The ecosystem demonstrates significant innovations in self-driving database management, artificial intelligence integration, and process automation while addressing critical challenges in migration and system integration. Through its multi-layered security architecture, automated optimization capabilities, and extensive integration features, Oracle's cloud platform enables organizations to achieve digital transformation while maintaining operational efficiency and data security.
APA, Harvard, Vancouver, ISO, and other styles
45

Mukta Sharma. "Optimizing Cloud Computing Performance: A Comparative Study of Hybrid and Multi-Cloud Architectures." Journal of Sustainable Solutions 1, no. 4 (2024): 154–57. https://doi.org/10.36676/j.sust.sol.v1.i4.47.

Full text
Abstract:
The scalability, flexibility, and cost-efficiency offered by cloud computing have completely transformed the way organisations and enterprises handle their IT infrastructure. There has been a lot of buzz around hybrid and multi-cloud architectures recently due to the rising demand for efficient and dependable cloud services. To prevent vendor lock-in and increase redundancy, hybrid cloud architectures mix on-premises infrastructure with public and private cloud environments, while multi-cloud makes use of numerous cloud service providers. The performance optimisation methodologies of hybrid and multi-cloud systems are the main subject of this paper's comparative investigation. Using metrics like efficiency, adaptability, security, scalability, and performance, we compare and contrast the two designs and highlight their respective benefits and drawbacks. We also investigate and assess the effects of numerous optimisation methods on the system's overall performance, such as load balancing, resource allocation, and network performance management. The study's overarching goal is to help businesses optimise their cloud computing strategies by illuminating the factors that should be considered when choosing an architecture.
APA, Harvard, Vancouver, ISO, and other styles
46

Bayani, Samir Vinayak, Ravish Tillu, and Jawaharbabu Jeyaraman. "Streamlining Compliance: Orchestrating Automated Checks for Cloud-based AI/ML Workflows." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 413–35. http://dx.doi.org/10.60087/jklst.vol2.n3.p435.

Full text
Abstract:
Ensuring security and safeguarding data privacy within cloud workflows has garnered considerable attention in research circles. For instance, protecting the confidentiality of patients' private data managed within a cloud-deployed workflow is crucial, as is ensuring secure communication of such sensitive information among various stakeholders. In light of this, our paper proposes an architecture and a formal model for enforcing security within cloud workflow orchestration. The proposed architecture underscores the importance of monitoring cloud resources, workflow tasks, and data to identify and anticipate anomalies in cloud workflow orchestration. To achieve this, we advocate a multi-modal approach combining deep learning, one-class classification, and clustering techniques. In summary, our proposed architecture offers a comprehensive solution to security enforcement within cloud workflow orchestration, leveraging advanced techniques like deep learning for anomaly detection and prediction, particularly pertinent in critical domains such as healthcare during unprecedented times like the COVID-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
47

Shinu Pushpan. "Multi-Tenant Architecture: A Comprehensive Framework for Building Scalable SaaS Applications." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1117–26. https://doi.org/10.32628/cseit241061151.

Full text
Abstract:
Multi-tenant architecture has emerged as a fundamental paradigm in modern software development, particularly in Software as a Service (SaaS) applications where multiple organizations share computing resources while maintaining data isolation. This article presents a comprehensive framework for understanding and implementing multi-tenant systems, focusing on essential architectural decisions and design patterns that ensure scalability, security, and resource efficiency. The article examines the evolution from single-tenant to multi-tenant architectures, analyzes various data partitioning strategies, and explores critical aspects of tenant isolation, authentication, and authorization mechanisms. The article addresses key challenges in performance optimization, resource allocation, and security implementation, providing practical insights into database design approaches and caching strategies. Through a structured approach, this article bridges the gap between theoretical concepts and practical implementation, offering developers and architects a foundation for building robust multi-tenant systems. The findings emphasize the importance of balanced architectural decisions that accommodate both technical requirements and business objectives while maintaining system integrity and tenant isolation. This article contributes to the growing body of knowledge in cloud computing and distributed systems, providing practitioners with actionable insights for developing scalable multi-tenant applications.
APA, Harvard, Vancouver, ISO, and other styles
48

Hussain, Nasir. "DDOS Protection System for Cloud: Architecture and Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 187–91. https://doi.org/10.22214/ijraset.2025.65932.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks, in the realm of cloud computing, have become the most serious threats to the availability and reliability of services. However, these attacks become the direct cause of the target system slowdown or shutdown by saturating the servers with a massive amount of traffic. This harms the cloud-based applications' performance. As cloud infrastructure has become the backbone of every company, the development of effective and scalable DDoS protection mechanisms to ensure the continuity of services is a must. This paper gives a clear overview of the architecture and equipment involved in the cloud-based DDoS protection system. We look at the different layers of protection such as traffic filtering, rate-limiting, anomaly detection, and the application of security services native to the cloud. Examples of such Web Application Firewalls (WAFs), Content Delivery Networks (CDNs), and Cloud Security Posture Management (CSPM) systems. The architecture employs distributed and multi-layered security solutions for detecting and mitigating the attack in real-time whilst keeping the legitimate users safe from any effects
APA, Harvard, Vancouver, ISO, and other styles
49

Mohammad Asad Hussain. "Blockchain for secure data integration in multi-cloud and hybrid cloud systems." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 743–53. https://doi.org/10.30574/wjarr.2025.26.2.1658.

Full text
Abstract:
This article presents a comprehensive framework for applying blockchain technology to secure data integration challenges in multi-cloud and hybrid-cloud environments. This article examines how distributed ledger technology creates a trust layer that addresses key vulnerabilities in traditional integration approaches while maintaining performance characteristics suitable for enterprise deployments. This article's architecture leverages permissioned blockchain networks, smart contracts, and cryptographic verification mechanisms to ensure data integrity, enforce governance policies, and provide immutable audit trails across heterogeneous cloud platforms. Our performance evaluation demonstrates viable throughput and latency characteristics compared to traditional integration methods, while offering enhanced security properties. Through case studies in financial services, healthcare, supply chain, and critical infrastructure protection, we illustrate practical implementations and quantifiable benefits. Despite challenges in scalability, energy consumption, legacy system integration, regulatory compliance, and organizational adoption, the architecture shows promising results for high-value data workflows. The research contributes to the emerging intersection of blockchain and multi-cloud computing by providing both theoretical foundations and practical implementation guidance for organizations seeking to enhance security posture across distributed cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
50

Aravind Guduru. "The Architecture of Trust: Deep Diving into Cloud Security Infrastructure." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 436–44. https://doi.org/10.32996/jcsts.2025.7.3.50.

Full text
Abstract:
The Architecture of Trust: Deep Diving into Cloud Security Infrastructure examines the sophisticated technical foundations underpinning modern cloud security systems. This comprehensive analysis explores the multi-layered approach implemented by hyperscalers, beginning with custom silicon security processors that establish hardware roots of trust and extending through measured boot processes, microsegmentation network architecture, and advanced encryption implementations. This article details how zero trust principles materialize through attribute-based access controls, continuous threat detection systems, and distributed security frameworks. By illuminating the intricate interplay between hardware and software security measures, this exploration provides critical insights for organizations navigating increasingly digital supply chains and preparing for emerging technologies like confidential computing and homomorphic encryption.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography