Journal articles on the topic 'Multi-Cloud Security Architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Multi-Cloud Security Architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
S. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.
Full textSantosh, Pashikanti. "Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework." International Journal of Leading Research Publication 4, no. 9 (2023): 1–4. https://doi.org/10.5281/zenodo.14646896.
Full textMunde, Amit V., and Dr Pranjali P. Deshmukh. "Multi Cloud Data Hosting with SIC Architecture." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1830–33. http://dx.doi.org/10.22214/ijraset.2022.40999.
Full textSatyanarayan Kanungo and Saumya Sarangi. "Quantum computing integration with multi-cloud architectures: enhancing computational efficiency and security in advanced cloud environments." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 564–74. http://dx.doi.org/10.30574/wjaets.2024.12.2.0319.
Full textNikhil, Bhagat. "Optimizing Performance, Cost-Efficiency, and Flexibility through Hybrid Multi-Cloud Architectures." Journal of Scientific and Engineering Research 11, no. 4 (2024): 372–79. https://doi.org/10.5281/zenodo.14273093.
Full textAdedamola Abiodun Solanke. "Zero trust security architectures for multi-cloud environments: Implementation strategies and measurable outcomes." World Journal of Advanced Engineering Technology and Sciences 3, no. 2 (2021): 122–34. https://doi.org/10.30574/wjaets.2021.3.2.0054.
Full textManne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 7, no. 3 (2025): 74–82. https://doi.org/10.47941/ijce.2753.
Full textManne, Tirumala Ashish Kumar. "Implementing Zero Trust Architecture in Multi-Cloud Environments." International Journal of Computing and Engineering 4, no. 3 (2023): 1–9. https://doi.org/10.47941/ijce.2754.
Full textRodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.
Full textMuralidhara, Pavan, and Vaishnavi Janardhan. "Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments." International Journal of Scientific Research and Management (IJSRM) 4, no. 9 (2016): 4636–64. https://doi.org/10.18535/ijsrm/v4i9.22.
Full textRishi Kumar Sharma. "Multi-Tenant Architectures in Modern Cloud Computing: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 307–17. https://doi.org/10.32628/cseit25111236.
Full textDong, Zhao Yang, and Lin Zhang. "A Comprehensive Security Strategy Applying to the Total Life Cycle of Cloud Computing Data Center." Applied Mechanics and Materials 556-562 (May 2014): 6259–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6259.
Full textThakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.
Full textZhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Full textNaga Swetha Kattula. "Next-Gen Cloud: The future of secure and seamless cross-platform integrations." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1302–8. https://doi.org/10.30574/wjarr.2025.26.1.1090.
Full textMathew Sebastian. "Multi-Layer Security Architecture for Cloud-Connected Autonomous Systems." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 798–803. https://doi.org/10.32996/jcsts.2025.7.3.87.
Full textSwati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.
Full textMugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes." International Journal of Information Security and Privacy 11, no. 1 (2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.
Full textBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Full textSai Teja Battula. "A Comprehensive Framework for Evaluating the Scalability and Security of Fintech Web Applications in a Cloud-Native Environment." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1940–50. https://doi.org/10.32628/cseit23112567.
Full textSegun Adanigbo, Oluwasanmi, Bolaji Iyanu Adekunle, Ejielo Ogbuefi, Oyejide Timothy Odofin, Oluwademilade Aderemi Agboola, and Denis Kisina. "Implementing Zero Trust Security in Multi-Cloud Microservices Platforms: A Review and Architectural Framework." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2402–9. https://doi.org/10.62225/2583049x.2024.4.6.4357.
Full textYalate, Arunkumarreddy. "Demystifying Multi-Cloud Architecture: Foundational Concepts and Design Patterns." European Journal of Computer Science and Information Technology 13, no. 24 (2025): 51–62. https://doi.org/10.37745/ejcsit.2013/vol13n245162.
Full text.Nishchitha TS, Prof. "A Secure Approach for Multicloud Environment." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48917.
Full textRavikanth Reddy Gudipati. "Implementing a multi-tenant FIDO relying party server: Architecture, security, and scalability considerations." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 765–73. https://doi.org/10.30574/wjaets.2025.15.1.0304.
Full textPashikanti, Santosh. "Proactive Threat Detection in Cloud Ecosystems: SIEM, Monitoring, and Automated Remediation." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–7. https://doi.org/10.55041/isjem01417.
Full textMartins, Joberto S. B., Tereza C. Carvalho, Rodrigo Moreira, et al. "Enhancing Network Slicing Architectures with Machine Learning, Security, Sustainability and Experimental Networks Integration." IEEE ACCESS 11 (July 6, 2023): 1–20. https://doi.org/10.1109/ACCESS.2023.3292788.
Full textTang, Jian Gang. "The Research on Cloud Computing Security Model and Countermeasures." Applied Mechanics and Materials 511-512 (February 2014): 1196–200. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1196.
Full textVikas, Prajapati. "Cloud-Based Database Management: Architecture, Security, challenges and solutions." Journal of Global Research in Electronics and Communications (JGREC) 1, no. 1 (2025): 07–13. https://doi.org/10.5281/zenodo.14934833.
Full text., Kalyani M. Borse. "SECURITY IN MULTI-CLOUD DATA STORAGE WITH SIC ARCHITECTURE." International Journal of Research in Engineering and Technology 03, no. 02 (2014): 81–84. http://dx.doi.org/10.15623/ijret.2014.0302015.
Full textKalyashina, Anna, Yuri Smirnov, Valeriy Esov, Maxim Kuznetsov, and Oksana Dmitrieva. "Enhancing IoT systems through Cloud-Fog-Edge architectures challenges and opportunities." E3S Web of Conferences 583 (2024): 06012. http://dx.doi.org/10.1051/e3sconf/202458306012.
Full textFan, Yi Jie, Zhen Qiao, and Ming Zhong Xiao. "One Cloud: A Secure and Anonymous Multi-Cloud Oblivious Storage Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5591–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5591.
Full textGirish Poojar. "The Evolution of Cloud Computing: Key Trends Shaping the Next Decade." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3215–23. https://doi.org/10.32628/cseit251112340.
Full textSachin Kumar. "The Rise of Multi-Cloud Architecture: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2836–43. https://doi.org/10.32628/cseit251112305.
Full textChimakurthi, Venkata Naga Satya Surendra. "The Challenge of Achieving Zero Trust Remote Access in Multi-Cloud Environment." ABC Journal of Advanced Research 9, no. 2 (2020): 89–102. http://dx.doi.org/10.18034/abcjar.v9i2.608.
Full textRamadevi Sannapureddy. "Cloud-Native Enterprise Integration: Architectures, Challenges, and Best Practices." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 167–73. https://doi.org/10.32996/jcsts.2025.7.5.22.
Full textZkik, Karim, Ghizlane Orhanou, and Said El Hajji. "Secure Mobile Multi Cloud Architecture for Authentication and Data Storage." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 62–76. http://dx.doi.org/10.4018/ijcac.2017040105.
Full textSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Revolutionizing data center security: Conceptualizing a unified security framework for hybrid and multi-cloud data centers." Open Access Research Journal of Science and Technology 5, no. 2 (2022): 086–76. https://doi.org/10.53022/oarjst.2022.5.2.0065.
Full textBaladari, Venkata. "Cloud Resiliency Engineering: Best Practices for Ensuring High Availability in Multi-Cloud Architectures." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 2062–67. https://doi.org/10.21275/SR220610115023.
Full textMamidi, Sundeep Reddy. "Securing Multi-Cloud Architectures: A Machine Learning Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 233–47. http://dx.doi.org/10.60087/jaigs.v2i1.160.
Full textBenkhelifa, Elhadj, Dayan Abishek Fernando, and Thomas Welsh. "A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization." International Journal of Cloud Applications and Computing 3, no. 3 (2013): 34–49. http://dx.doi.org/10.4018/ijcac.2013070103.
Full textOmoniyi Babatunde Johnson, Jeremiah Olamijuwon, Emmanuel Cadet, Olajide Soji Osundare, and Zein Samira. "Designing multi-cloud architecture models for enterprise scalability and cost reduction." Open Access Research Journal of Engineering and Technology 7, no. 2 (2024): 101–13. http://dx.doi.org/10.53022/oarjet.2024.7.2.0061.
Full textYakoob, S. K., and V. Krishna Reddy. "Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments." International Journal of e-Collaboration 19, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijec.316771.
Full textMikail, Abdullahi, and Bernardi Pranggono. "Securing Infrastructure-as-a-Service Public Clouds Using Security Onion." Applied System Innovation 2, no. 1 (2019): 6. http://dx.doi.org/10.3390/asi2010006.
Full textAlok Sarkar. "Oracle cloud ecosystem: A technical deep dive into key technologies." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1724. https://doi.org/10.30574/wjarr.2025.26.1.1222.
Full textMukta Sharma. "Optimizing Cloud Computing Performance: A Comparative Study of Hybrid and Multi-Cloud Architectures." Journal of Sustainable Solutions 1, no. 4 (2024): 154–57. https://doi.org/10.36676/j.sust.sol.v1.i4.47.
Full textBayani, Samir Vinayak, Ravish Tillu, and Jawaharbabu Jeyaraman. "Streamlining Compliance: Orchestrating Automated Checks for Cloud-based AI/ML Workflows." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 413–35. http://dx.doi.org/10.60087/jklst.vol2.n3.p435.
Full textShinu Pushpan. "Multi-Tenant Architecture: A Comprehensive Framework for Building Scalable SaaS Applications." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1117–26. https://doi.org/10.32628/cseit241061151.
Full textHussain, Nasir. "DDOS Protection System for Cloud: Architecture and Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 187–91. https://doi.org/10.22214/ijraset.2025.65932.
Full textMohammad Asad Hussain. "Blockchain for secure data integration in multi-cloud and hybrid cloud systems." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 743–53. https://doi.org/10.30574/wjarr.2025.26.2.1658.
Full textAravind Guduru. "The Architecture of Trust: Deep Diving into Cloud Security Infrastructure." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 436–44. https://doi.org/10.32996/jcsts.2025.7.3.50.
Full text