To see the other types of publications on this topic, follow the link: Robust Cloud Solutions.

Journal articles on the topic 'Robust Cloud Solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Robust Cloud Solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.

Full text
Abstract:
Abstract: “This research paper provides a sufficient overview of security challenges in cloud computing and corresponding solutions. Challenges include data breaches, compliance issues, and insider threats, while solutions encompass robust access controls, encryption, and API security measures. By implementing these solutions, organizations can mitigate risks and securely harness the advantages of cloud computing.”
APA, Harvard, Vancouver, ISO, and other styles
2

Mortazavi, Faezeh, Alexander Kuzminykh, Volker Ahlers, Claus Brenner, and Monika Sester. "Integrated Multi-Stereo Camera System for Robust Indoor Localization with Temporal Fusion." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVIII-2/W7-2024 (December 13, 2024): 81–87. https://doi.org/10.5194/isprs-archives-xlviii-2-w7-2024-81-2024.

Full text
Abstract:
Abstract. This paper presents a novel multi-stereo camera system for robust indoor localization, leveraging point cloud data and temporal fusion techniques. The system integrates three synchronized stereo cameras to capture point clouds from multiple angles, enhancing coverage and improving point cloud density in complex indoor environments. By combining data from different perspectives and accumulating point clouds over time, the method mitigates the limitations in the short range of point clouds derived from stereo cameras, ensuring broader coverage for effective localization. To manage the
APA, Harvard, Vancouver, ISO, and other styles
3

Laxminarayana, Korada, and Kartik Sikha Vijay. "Enterprises Are Challenged by Industry-Specific Cloud Adaptation - Microsoft Industry Cloud Custom-Fits, Outpaces Competition and Eases Integration." Journal of Scientific and Engineering Research 9, no. 12 (2022): 182–87. https://doi.org/10.5281/zenodo.13348175.

Full text
Abstract:
Cloud computing has revolutionized how enterprises manage their IT infrastructure, offering flexibility, scalability, and cost-efficiency. However, aligning cloud solutions with specific industry needs remains a challenge. Microsoft Industry Cloud addresses this by providing tailored cloud services designed for vertical markets. This paper explores the concept of Industry Cloud, its significance for businesses, and compares Microsoft's offerings with other public cloud providers. It highlights Microsoft's competitive advantages, including sector-specific solutions, flexible pricing models, a r
APA, Harvard, Vancouver, ISO, and other styles
4

Santosh, Pashikanti. "Integrating AI/ML in Enterprise Cloud Solutions: Challenges, Solutions, and Case Studies." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 1 (2024): 1–5. https://doi.org/10.5281/zenodo.14631709.

Full text
Abstract:
The rapid evolution of Artificial Intelligence (AI) and Machine Learning (ML) has transformed how enterprises design, develop, and deploy software and infrastructure. Cloud computing provides a robust, scalable, and cost-effective environment to operationalize AI/ML models. However, integrating AI/ML into enterprise cloud solutions presents unique challenges in areas such as data governance, model lifecycle management, scalability, security, and regulatory compliance. This white paper offers a deep technical exploration of these challenges and the solutions adopted by industry leaders, as well
APA, Harvard, Vancouver, ISO, and other styles
5

Rapolu, Upesh Kumar. "Implementing Hybrid Cloud Solutions Using Azure Arc to Integrate On-Premises and Cloud Environments." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–6. https://doi.org/10.55041/ijsrem13098.

Full text
Abstract:
The following research paper has provided the importance of implementing a hybrid cloud solution using Azzue Arc and integrating it into on-premises and cloud environments. At the same time, the key benefits which have been observed are minimising the overall costs, robust compliance and security, centralised management and being scalable and flexible. Furthermore, challenges have been identified as keeping track and location of the resources and controlling the costs have been mitigated by the augmentation of strategies such as the application of robust security and control and monitoring and
APA, Harvard, Vancouver, ISO, and other styles
6

Dave, Rushi. "Cybersecurity in Cloud Computing Environments: Challenges and Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40961.

Full text
Abstract:
- Cloud computing makes it possible to manage and send out IT services to organizations in a scalable, flexible and cost-effective way. Consequently, the cloud computing is rapidly going popular as it also poses many significant cybersecurity challenges .This research paper investigates the unique security considerations inherent in cloud computing environments and proposes strategies for enhancing cybersecurity in the cloud. Through a comprehensive analysis of current practices, vulnerabilities, and emerging threats, this paper aims to provide insights into the state of cloud security and off
APA, Harvard, Vancouver, ISO, and other styles
7

Pendyala, Santhosh Kumar. "Strengthening Healthcare Cybersecurity: Leveraging Multi-Cloud and AI Solutions." Journal of Computer Science Applications and Information Technology 10, no. 1 (2025): 1–8. https://doi.org/10.15226/2474-9257/10/1/00163.

Full text
Abstract:
The increasing reliance on digital systems in healthcare has heightened the need for robust cybersecurity frameworks to safeguard sensitive patient data and ensure uninterrupted service delivery. Healthcare institutions face unique challenges, including compliance with stringent regulatory standards, integration of disparate data systems, and mitigating evolving cyber threats. The adoption of multi-cloud architectures combined with artificial intelligence (AI) offers a promising solution to these challenges. Multi-cloud environments provide scalability, redundancy, and resilience, while AI enh
APA, Harvard, Vancouver, ISO, and other styles
8

Chou, Yuyu, and Jan Oetting. "Risk Assessment for Cloud-Based IT Systems." International Journal of Grid and High Performance Computing 3, no. 2 (2011): 1–13. http://dx.doi.org/10.4018/jghpc.2011040101.

Full text
Abstract:
The use of Cloud Computing services is an attractive option to improve IT systems to achieve rapidly and elastically provisioned capability, and also to offer economic benefits. However, companies see security as a major concern in migrating to the Cloud. To bring clarity in Cloud security, this paper presents a systematic approach to manage the risks and analyzes the full range of risk in Cloud Computing solutions. Furthermore, as a study case, Google App Engine Platform is assessed based on ISO/IEC 27002 and OWASP Top 10 Risk List in this paper. Knowing the risks of Cloud solutions, companie
APA, Harvard, Vancouver, ISO, and other styles
9

Muhammad Saad Zahoor, Et al. "Security Challenges and Solutions in AI-Enhanced Cloud Platforms: A Comprehensive Study." Power System Technology 47, no. 4 (2023): 103–18. http://dx.doi.org/10.52783/pst.161.

Full text
Abstract:
The integration of Artificial Intelligence (AI) into cloud computing platforms has revolutionized the landscape of modern computing, offering unprecedented capabilities and efficiencies. However, this union introduces a myriad of security challenges that demand meticulous examination and robust solutions. This comprehensive study delves into the security intricacies arising from the amalgamation of AI and cloud platforms, aiming to identify, analyze, and propose effective strategies to address these challenges. The research explores the multifaceted dimensions of security challenges in AI-enha
APA, Harvard, Vancouver, ISO, and other styles
10

Aditya Sharma. "Cloud computing and enterprise cloud foundations: A technical overview." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 897–906. https://doi.org/10.30574/wjaets.2025.15.3.1006.

Full text
Abstract:
Cloud computing has fundamentally transformed how organizations architect, deploy, and manage their IT infrastructure, marking a paradigm shift from traditional on-premises solutions to dynamic, internet-based delivery models. This transformation encompasses various deployment models including public, private, and hybrid clouds, each offering distinct advantages in terms of scalability, security, and cost optimization. The evolution of cloud computing has led to the development of sophisticated enterprise cloud foundations that incorporate comprehensive governance frameworks, robust security a
APA, Harvard, Vancouver, ISO, and other styles
11

Imashev, A. "CYBERSECURITY CHALLENGES IN THE ERA OF CLOUD COMPUTING, RISKS AND ITS SOLUTIONS." Sciences of Europe, no. 159 (March 2, 2025): 66–69. https://doi.org/10.5281/zenodo.14956971.

Full text
Abstract:
This article examines the cybersecurity challenges that arise in the era of cloud computing, focusing on the inherent risks and contemporary solutions available to mitigate these threats. As organizations increasingly adopt cloud services for data storage, application hosting, and business process integration, they face heightened risks including data breaches, ransomware attacks, insider threats, and vulnerabilities from third-party service providers. The study critically analyzes the evolving threat landscape and highlights the importance of robust security measures such as end-to-end encryp
APA, Harvard, Vancouver, ISO, and other styles
12

Syed, Zaid, Kumar Mishra Pranav, TR Yogish, and B. Manjunath. "THE EVOLVING CLOUD SECURITY LANDSCAPE: CHALLENGES AND SOLUTIONS." Recent Trends in Cloud Computing and Web Engineering 7, no. 2 (2025): 1–7. https://doi.org/10.5281/zenodo.15117664.

Full text
Abstract:
<em>Cloud Computing has emerged as a pivotal technology in the IT industry over recent years. Its widespread adoption can be attributed to the significant economic benefits it offers. Numerous Cloud Service Providers (CSPs) now enable users to host their applications and data on cloud platforms. However, a major challenge persists in the form of Cloud Security, which hinders the full- scale adoption and utilization of cloud services. This issue continues to prevent many users from taking advantage of the diverse services cloud computing offers.</em> <em>To address these concerns, various mecha
APA, Harvard, Vancouver, ISO, and other styles
13

Alharbi, Mohammed Ahmad, and Rizwan Qureshi. "Towards a Robust Quality Assurance Framework for Cloud Computing Environments." International Journal of Software Engineering & Applications 16, no. 1 (2025): 39–51. https://doi.org/10.5121/ijsea.2025.16103.

Full text
Abstract:
Trends such as cloud computing raise issues regarding stable and uniform quality assurance (QA) and validation of software requirements. Current QA frameworks are poorly defined, often not automated, and lack the flexibility needed for on-demand, cloud-based environments. These gaps lead to inconsistencies in service delivery, challenges in scaling organizational capacity, and internal and external inefficiencies that affect the reliability and effectiveness of cloud services. This paper presents a detailed framework for QA in cloud computing systems and advocates for standardized, automated,
APA, Harvard, Vancouver, ISO, and other styles
14

Pradeep Kiran Veeravalli. "Cloud-Native AI Solutions: Transforming enterprise application development." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3253–61. https://doi.org/10.30574/wjarr.2025.26.1.1402.

Full text
Abstract:
Cloud-native artificial intelligence represents a transformative paradigm shift in enterprise application development, fundamentally altering how organizations design, deploy, and scale AI-powered solutions. The convergence of cloud computing infrastructure with advanced AI capabilities has created a rapidly expanding market with significant growth projections through 2028. Major cloud platforms, including AWS, Microsoft Azure, and Google Cloud, have established themselves as foundational elements in this ecosystem, offering specialized services that significantly optimize development cycles a
APA, Harvard, Vancouver, ISO, and other styles
15

Rapolu, Upesh Kumar. "Developing Custom Software Solutions for Compliance in Multi-Cloud Environments." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–7. https://doi.org/10.55041/ijsrem28015.

Full text
Abstract:
The transition to utilizing different cloud platforms has provided enterprises with unprecedented flexibility and scalability. Nevertheless, it also presents new obstacles for fulfilling compliance obligations and executing audits. Organizations must navigate various regulations, safeguard data across jurisdictions, and rectify vulnerabilities prevalent in cloud systems. Although technologies such as AWS Audit Manager, Microsoft Compliance Manager, and Google Cloud Security Command Center are beneficial, they frequently lack interoperability across various cloud platforms. This study examines
APA, Harvard, Vancouver, ISO, and other styles
16

Himani R. Gandhi and Dr. Bhawesh Kumawat. "Identification Important Factors of Cloud Computing On Business Growth with Consideration of Consumers Preference." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 3 (2025): 633–40. https://doi.org/10.32628/cseit25113327.

Full text
Abstract:
Analysing key factors influencing their preferences. The findings reveal that cost efficiency is the most crucial factor, emphasizing the demand for affordable cloud solutions. Data privacy ranks second, reflecting concerns about cybersecurity and regulatory compliance. Scalability and flexibility are the least prioritized factor, indicating that businesses may not require highly scalable infrastructure immediately. Among cloud computing tools, Google Drive is the most preferred platform, highlighting a strong inclination toward cost-effective and user-friendly storage solutions. Dropbox follo
APA, Harvard, Vancouver, ISO, and other styles
17

Shekhar Mishra. "Building Scalable Cloud Databases with Database Reliability Engineering." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1322–33. https://doi.org/10.32628/cseit251112125.

Full text
Abstract:
This comprehensive article explores the evolution and implementation of Database Reliability Engineering (DBRE) in cloud environments, focusing on the transformation from traditional database management to modern cloud-based solutions. The article examines key aspects of scalable database architectures, including elastic scalability, serverless solutions, and advanced scaling techniques. The article investigates various strategies for ensuring database reliability, performance optimization, and cost management while addressing challenges in data distribution and consistency maintenance. Throug
APA, Harvard, Vancouver, ISO, and other styles
18

Kiran Kumar Lekkala. "Technical deep dive: SAP's evolution in enterprise resource planning." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 2848–54. https://doi.org/10.30574/wjarr.2025.26.1.1386.

Full text
Abstract:
The transformation of enterprise resource planning systems through SAP's technological innovations marks a significant advancement in cloud computing, artificial intelligence, and sustainable business practices. SAP's evolution from traditional ERP to cloud-based solutions demonstrates the integration of cutting-edge technologies while maintaining robust security and performance standards. The introduction of SAP S/4HANA Cloud and Business Technology Platform has revolutionized enterprise computing through in-memory processing, microservices architecture, and advanced analytics capabilities. T
APA, Harvard, Vancouver, ISO, and other styles
19

Hemanth, Kumar. "Integrating Cloud Solutions with Legacy Systems in the Airline Industry." International Journal on Science and Technology 14, no. 3 (2023): 1–7. https://doi.org/10.5281/zenodo.14803208.

Full text
Abstract:
The airline industry has traditionally relied on robust but rigid legacy systems for essential operations, ranging from reservation systems to fleet management. These legacy systems, while reliable, often lack the agility required for modern data-driven and customer-focused applications. Cloud computing has emerged as a transformative technology, offering scalability, cost efficiency, and advanced analytics capabilities. However, integrating these modern cloud solutions with entrenched legacy systems poses significant challenges. This paper presents an in-depth analysis of these challenges, di
APA, Harvard, Vancouver, ISO, and other styles
20

Choubey, Jaya, Divya Pandey, Indukant Patel, and Namrata Bairagi. "Security Challenges and Solutions In Cloud Computing: A Critical Review." International Journal of Innovative Research in Computer and Communication Engineering 10, no. 11 (2022): 8545–50. http://dx.doi.org/10.15680/ijircce.2022.1011049.

Full text
Abstract:
Cloud computing has revolutionized IT infrastructure by offering scalability, flexibility, and costeffectiveness, but it also introduces significant security challenges. This review paper critically examines the security issues inherent in cloud computing environments, such as data breaches, unauthorized access, and compliance risks. It explores current solutions and best practices for mitigating these challenges, including encryption techniques, access control mechanisms, and proactive monitoring systems. The paper evaluates the effectiveness of these solutions in safeguarding data integrity,
APA, Harvard, Vancouver, ISO, and other styles
21

Perumalsamy Ravindran. "Automating Multi-Cloud Infrastructure: Leveraging Terraform and IaC for Scalable, Secure, and Efficient Cloud Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2240–47. https://doi.org/10.32628/cseit25112704.

Full text
Abstract:
Cloud computing transformation has revolutionized digital infrastructure management, particularly in multi-cloud environments. The substantial growth in cloud adoption, especially in Infrastructure as a Service, reflects increasing confidence in cloud-based solutions across industries. Implementing Infrastructure as Code principles, robust security frameworks, and automated compliance mechanisms enables organizations to achieve enhanced operational efficiency and reduced deployment times. The effectiveness of cloud-native technologies and automated infrastructure management becomes evident thr
APA, Harvard, Vancouver, ISO, and other styles
22

Alava, Pallavi, and G. Radhika. "Robust and Secure Framework for Mobile Cloud Computing." Asian Journal of Computer Science and Technology 8, S3 (2019): 1–6. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2115.

Full text
Abstract:
Smartphone devices are widely utilized in our daily lives. However, these devices exhibit limitations, like short battery lifetime, limited computation power, small memory size and unpredictable network connectivity. Therefore, various solutions have been projected to mitigate these limitations and extend the battery period of time with the employment of the offloading technique. In this paper, a unique framework is projected to offload intensive computation tasks from the mobile device to the cloud. This framework uses Associate in Nursing improvement model to work out the offloading decision
APA, Harvard, Vancouver, ISO, and other styles
23

Abikoye, Bibitayo Ebunlomo. "Development of Secure Cloud-Based Government Solutions." European Journal of Computer Science and Information Technology 12, no. 5 (2024): 17–35. http://dx.doi.org/10.37745/ejcsit.2013/vol12n51735.

Full text
Abstract:
Government agencies face significant security and efficiency challenges when adopting cloud solutions. These challenges include data breaches, unauthorized access, and compliance with stringent regulatory standards. This paper explores the development of secure and efficient cloud-based solutions tailored specifically for government needs, aiming to address these critical issues. These solutions protect sensitive government data by focusing on robust security protocols, advanced encryption methods, multi-factor authentication, and continuous monitoring. Additionally, integrating technologies s
APA, Harvard, Vancouver, ISO, and other styles
24

Zaripova, Rimma, Adam Mentsiev, and Rushan Zainash. "Leveraging hybrid cloud architectures and Cosmos DB for sustainable IT solutions in ecology and natural resource management." E3S Web of Conferences 542 (2024): 06001. http://dx.doi.org/10.1051/e3sconf/202454206001.

Full text
Abstract:
This article delves into the integration of hybrid cloud architectures with Cosmos DB, highlighting the strategic advantages and addressing the challenges organizations face in adopting this modern IT infrastructure. As businesses strive for greater flexibility, scalability, and security in their digital operations, hybrid cloud architectures emerge as a pivotal solution, blending the strengths of private and public clouds. The incorporation of Cosmos DB, with its global distribution, multi-model support, and tunable consistency levels, further enhances the capabilities of hybrid clouds, offer
APA, Harvard, Vancouver, ISO, and other styles
25

Vivek, Prasanna Prabu. "CI/CD in a Multi-Cloud World: Challenges and Solutions." International Journal of Leading Research Publication 6, no. 3 (2025): 1–8. https://doi.org/10.5281/zenodo.15154849.

Full text
Abstract:
Continuous Integration and Continuous Deployment (CI/CD) have become critical components of modern software development lifecycles, enabling rapid delivery, iterative development, and operational efficiency. As enterprises increasingly adopt multi-cloud strategies - leveraging multiple public and private cloud platforms such as AWS, Azure, Google Cloud, and on-premise infrastructure - the complexity of implementing and managing CI/CD pipelines across heterogeneous environments grows significantly. These challenges include inconsistent tooling, integration friction, data sovereignty, latency va
APA, Harvard, Vancouver, ISO, and other styles
26

Srikanth, Kandragula. "Cloud Computing in IoT Applications." European Journal of Advances in Engineering and Technology 7, no. 1 (2020): 70–72. https://doi.org/10.5281/zenodo.13950929.

Full text
Abstract:
The burgeoning Internet of Things (IoT) landscape, with its ever-increasing network of interconnected devices, generates a massive and ever-expanding stream of data. This data deluge necessitates robust solutions for storage, processing, and analysis. Cloud computing emerges as the ideal platform, offering unparalleled scalability, security, and real-time analytics capabilities. This paper explores the symbiotic relationship between cloud computing and IoT applications, highlighting the key advantages cloud computing offers and showcasing its transformative impact across various IoT domains.
APA, Harvard, Vancouver, ISO, and other styles
27

Barstow, Joanna K. "Unveiling cloudy exoplanets: the influence of cloud model choices on retrieval solutions." Monthly Notices of the Royal Astronomical Society 497, no. 4 (2020): 4183–95. http://dx.doi.org/10.1093/mnras/staa2219.

Full text
Abstract:
ABSTRACT In recent years, it has become clear that a substantial fraction of transiting exoplanets have some form of aerosol present in their atmospheres. Transit spectroscopy – mostly of hot Jupiters, but also of some smaller planets – has provided evidence for this, in the form of steep downward slopes from blue to red in the optical part of the spectrum, and muted gas absorption features throughout. Retrieval studies seeking to constrain the composition of exoplanet atmospheres must therefore account for the presence of aerosols. However, clouds and hazes are complex physical phenomena, and
APA, Harvard, Vancouver, ISO, and other styles
28

Naresh, Lokiny. "Hybrid and Multi-Cloud Strategies for DevOps." European Journal of Advances in Engineering and Technology 9, no. 10 (2022): 62–65. https://doi.org/10.5281/zenodo.13325878.

Full text
Abstract:
modern DevOps practices. This paper explores the integration of hybrid and multi-cloud solutions within the DevOps framework, analyzing their benefits, challenges, methodologies, and real-world applications. Through a comprehensive literature review and case studies, we present a robust understanding of how these strategies enhance agility, scalability, and resilience in software development and operations. The advent of cloud computing has transformed the landscape of DevOps, positioning hybrid and multi-cloud strategies as critical components for modern software development and operations. T
APA, Harvard, Vancouver, ISO, and other styles
29

Sakthiswaran, Rangaraju, Stephanie Ness Dr., and Dharmalingam Rajesh. "Incorporating AI-Driven Strategies in DevSecOps for Robust Cloud Security." Incorporating AI-Driven Strategies in DevSecOps for Robust Cloud Security 8, no. 11 (2023): 7. https://doi.org/10.5281/zenodo.10361289.

Full text
Abstract:
This research paper explores the integrationof artificial intelligence (AI) strategies into theDevSecOps framework to enhance cloud securityincluding using an analytical techniques, leveraging bothquantitative and qualitative methodologies to assess theefficacy of AI-solutions in mitigating security risks. Thisstudies contributes to a nuanced knowledge of thesymbiotic relationship among AI and DevSecOps,shedding light on how combining artificial intelligencetechnology can improves security. The paperadditionally discusses implications and challengesrelated to implementing AI in DevSecOps workf
APA, Harvard, Vancouver, ISO, and other styles
30

Karthik Venkatesh Ratnam. "From Outages to Excellence: Building Resilience with Disaster Recovery in the Cloud." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1997–2006. https://doi.org/10.32628/cseit251112208.

Full text
Abstract:
Cloud-based disaster recovery (DR) has emerged as a transformative approach to building organizational resilience, fundamentally changing how businesses protect their critical systems and data. This article explores the evolution from traditional DR methods to modern cloud-based solutions, examining their architectural components, implementation strategies across various industries, and integration with advanced technologies. Through analysis of real-world applications and case studies, it demonstrates how cloud DR solutions enable organizations to achieve superior recovery objectives while ma
APA, Harvard, Vancouver, ISO, and other styles
31

Shilpa, Burade Prof. Jayant Adhikari Prof. Nilesh Mhaiskar Prof. Mukesh Trone. "Secure File Storage on Cloud using Hybrid Cryptography with Triple Encryption." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 208–12. https://doi.org/10.5281/zenodo.15433621.

Full text
Abstract:
In today's digital age, cloud computing has become the backbone of data storage for both individuals and organizations. The adoption of cloud-based solutions offers scalability, flexibility, and cost-efficiency, enabling users to store and access vast amounts of data remotely. However, with the growing volume of sensitive information being stored in the cloud, the need for robust security measures has never been more critical. Data breaches, cyber-attacks, and unauthorized access remain constant threats to the integrity and privacy of cloud-stored data.
APA, Harvard, Vancouver, ISO, and other styles
32

Samuel Olaoluwa Folorunsho, Olubunmi Adeolu Adenekan, Chinedu Ezeigweneme, Ike Chidiebere Somadina, and Patrick Azuka Okeleke. "Revolutionizing telecommunications with cloud computing: Scalable and flexible solutions for the future." International Journal of Frontiers in Engineering and Technology Research 7, no. 1 (2024): 053–72. http://dx.doi.org/10.53294/ijfetr.2024.7.1.0040.

Full text
Abstract:
This paper explores the transformative potential of cloud computing in the telecommunications industry, emphasizing its scalability and flexibility. The objective is to analyze how cloud computing solutions can revolutionize telecommunications by providing scalable, cost-effective, and flexible infrastructures that accommodate the industry's growing demands. The research methodology involves a comprehensive literature review, case studies of leading telecommunications companies adopting cloud computing, and an analysis of industry reports and data. Key findings indicate that cloud computing si
APA, Harvard, Vancouver, ISO, and other styles
33

Bibitayo Ebunlomo Abikoye and Cedrick Agorbia-Atta. "Securing the cloud: Advanced solutions for government data protection." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 901–5. http://dx.doi.org/10.30574/wjarr.2024.23.2.2420.

Full text
Abstract:
This study examines government agencies' critical security challenges when adopting cloud-based solutions. As governments increasingly migrate their services to the cloud to enhance efficiency and reduce costs, they must contend with significant risks, including data breaches, unauthorized access, and regulatory compliance. To mitigate these threats, the paper explores implementing robust security measures such as advanced encryption methods, multi-factor authentication (MFA), continuous monitoring, and Zero Trust Architecture. The research emphasizes the importance of adhering to internationa
APA, Harvard, Vancouver, ISO, and other styles
34

Bibitayo, Ebunlomo Abikoye, and Agorbia-Atta Cedrick. "Securing the cloud: Advanced solutions for government data protection." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 901–5. https://doi.org/10.5281/zenodo.14848512.

Full text
Abstract:
This study examines government agencies' critical security challenges when adopting cloud-based solutions. As governments increasingly migrate their services to the cloud to enhance efficiency and reduce costs, they must contend with significant risks, including data breaches, unauthorized access, and regulatory compliance. To mitigate these threats, the paper explores implementing robust security measures such as advanced encryption methods, multi-factor authentication (MFA), continuous monitoring, and Zero Trust Architecture. The research emphasizes the importance of adhering to internationa
APA, Harvard, Vancouver, ISO, and other styles
35

Pashikanti, Santosh. "Proactive Threat Detection in Cloud Ecosystems: SIEM, Monitoring, and Automated Remediation." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–7. https://doi.org/10.55041/isjem01417.

Full text
Abstract:
In modern cloud ecosystems, the stakes are higher than ever for proactive threat detection and rapid incident response. As organizations embrace multi-cloud and hybrid environments, traditional security controls must evolve to protect distributed workloads and data. Security Information and Event Management (SIEM) platforms, continuous monitoring, and automated remediation mechanisms form the backbone of a robust, proactive security strategy. This white paper delves into the technical underpinnings of these solutions, highlighting architectural components, methodologies, and implementation con
APA, Harvard, Vancouver, ISO, and other styles
36

Francis, Alistair, Panagiotis Sidiropoulos, and Jan-Peter Muller. "CloudFCN: Accurate and Robust Cloud Detection for Satellite Imagery with Deep Learning." Remote Sensing 11, no. 19 (2019): 2312. http://dx.doi.org/10.3390/rs11192312.

Full text
Abstract:
Cloud masking is of central importance to the Earth Observation community. This paper deals with the problem of detecting clouds in visible and multispectral imagery from high-resolution satellite cameras. Recently, Machine Learning has offered promising solutions to the problem of cloud masking, allowing for more flexibility than traditional thresholding techniques, which are restricted to instruments with the requisite spectral bands. However, few studies use multi-scale features (as in, a combination of pixel-level and spatial) whilst also offering compelling experimental evidence for real-
APA, Harvard, Vancouver, ISO, and other styles
37

Teixeira, Bernardo, and Hugo Silva. "Deep Learning Point Cloud Odometry." U.Porto Journal of Engineering 7, no. 3 (2021): 70–79. http://dx.doi.org/10.24840/2183-6493_007.003_0006.

Full text
Abstract:
Achieving persistent and reliable autonomy for mobile robots in challenging field mission scenarios is a long-time quest for the Robotics research community. Deep learning-based LIDAR odometry is attracting increasing research interest as a technological solution for the robot navigation problem and showing great potential for the task.In this work, an examination of the benefits of leveraging learning-based encoding representations of real-world data is provided. In addition, a broad perspective of emergent Deep Learning robust techniques to track motion and estimate scene structure for real-
APA, Harvard, Vancouver, ISO, and other styles
38

Janak Bharat Bhalla. "Building resilient cloud infrastructure: Key lessons from major outages." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 4100–4106. https://doi.org/10.30574/wjarr.2025.26.1.1567.

Full text
Abstract:
Cloud computing has become fundamental to modern business operations, yet organizations face increasing challenges from service disruptions and outages. As enterprises become more dependent on cloud infrastructure, the need for robust resilience strategies has become paramount. The article presents key lessons learned from major cloud outages and offers strategic solutions for building resilient cloud infrastructure. By focusing on redundancy systems, multi-cloud architectures, advanced monitoring, and structured incident response procedures, organizations can enhance their operational stabili
APA, Harvard, Vancouver, ISO, and other styles
39

Dammalapati, Preetham Kumar. "Enhancing Healthcare Data Security with Cloud Identity Solutions." European Journal of Computer Science and Information Technology 13, no. 39 (2025): 65–83. https://doi.org/10.37745/ejcsit.2013/vol13n396583.

Full text
Abstract:
Healthcare organizations face unprecedented challenges in securing patient data while maintaining operational efficiency in an increasingly digital landscape. Cloud-based identity and access management solutions have emerged as critical infrastructure components for protecting sensitive medical information across distributed healthcare environments. These platforms address the complex requirements of modern healthcare delivery by implementing sophisticated authentication mechanisms, granular access controls, and comprehensive audit capabilities that align with stringent regulatory frameworks i
APA, Harvard, Vancouver, ISO, and other styles
40

Iqra Naseer. "AWS Cloud Computing Solutions: Optimizing Implementation for Businesses." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 5, no. 2 (2023): 121–32. http://dx.doi.org/10.52700/scir.v5i2.138.

Full text
Abstract:
This study delves into the optimization strategies of Amazon Web Services (AWS) cloud computing solutions tailored specifically for businesses. It provides an in-depth exploration of the transformative impact that cloud computing has had on modern business operations, emphasizing the pivotal role played by AWS in delivering scalable, flexible, and cost-effective resources. With projections indicating the global public cloud services market's growth to $332.3 billion in 2021, it becomes evident that cloud solutions are increasingly relied upon, with AWS commanding a significant 32% market share
APA, Harvard, Vancouver, ISO, and other styles
41

Prashanth Reddy Kora. "Understanding Multi-Cloud and Hybrid Cloud Architectures in Data Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 438–45. http://dx.doi.org/10.32628/cseit24106162.

Full text
Abstract:
This comprehensive article explores the growing adoption of multi-cloud and hybrid cloud architectures in modern data management practices. It delves into the benefits, challenges, and best practices associated with these complex cloud strategies. The article presents key statistics and projections from industry leaders, highlighting the rapid growth and increasing importance of multi-cloud and hybrid cloud solutions. It discusses how these architectures enhance data redundancy, vendor flexibility, cost optimization, and performance while addressing critical issues such as data sovereignty, sc
APA, Harvard, Vancouver, ISO, and other styles
42

Gyawali, Yadu Prasad, and Mandar S. Karyakarte. "A Modular Encryption Framework in Cloud and Mobile Environments for Cybersecurity Solutions in Health Information." Research Journal of Computer Systems and Engineering 4, no. 1 (2023): 64–73. http://dx.doi.org/10.52710/rjcse.64.

Full text
Abstract:
The rapidly evolving landscape of healthcare information systems, ensuring the security and privacy of sensitive health data is paramount. This abstract introduces an encryption framework designed for the unique challenges posed by cloud and mobile environments, offering robust cybersecurity solutions for health information. The framework integrates cutting-edge encryption technologies tailored to the specific requirements of both cloud-based storage and mobile devices, addressing the dynamic nature of healthcare data access. In cloud environments, the framework employs advanced encryption alg
APA, Harvard, Vancouver, ISO, and other styles
43

Tessy, Vincent* Mrs.Krishnaveni.V.V. "ROBUST AND EFFICIENT PRIVACY PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 6 (2017): 96–102. https://doi.org/10.5281/zenodo.802838.

Full text
Abstract:
Cloud computing is gaining more popularity because of its guaranteed services like online data storage and backup solutions, Web-based e-mail services, virtualized infrastructure etc. User is allowed to access the data stored in a cloud anytime, anywhere using internet connected device with low cost. To provide security to outsourced data in cloud storage against various corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Existing methods for remote regenerating-coded data checking only provide private auditing, wh
APA, Harvard, Vancouver, ISO, and other styles
44

Chandra Sekhara Reddy Adapa. "Cloud-based Master Data Management: Transforming Enterprise Data Strategy." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1057–65. https://doi.org/10.32628/cseit25112436.

Full text
Abstract:
Cloud-based Master Data Management (MDM) solutions are revolutionizing how organizations handle critical data assets in today's rapidly evolving digital landscape. These solutions offer enhanced scalability, flexibility, and real-time access capabilities that traditional on-premises systems struggle to match. By leveraging advanced technologies such as artificial intelligence, machine learning, and microservices architecture, cloud-based MDM enables organizations to achieve superior data quality, improved operational efficiency, and better business outcomes. The integration of blockchain techn
APA, Harvard, Vancouver, ISO, and other styles
45

Toth, Gergo, Sandor Szabo, Tamas Haidegger, and Marta Alexy. "Edge or Cloud Architecture: The Applicability of New Data Processing Methods in Large-Scale Poultry Farming." Technologies 13, no. 1 (2025): 17. https://doi.org/10.3390/technologies13010017.

Full text
Abstract:
As large-scale poultry farming becomes more intensive and concentrated, a deeper understanding of poultry meat production processes is crucial for achieving maximum economic and ecological efficiency. The transmission and analysis of data collected on birds and the farming environment in large-scale production environments using digital tools on a secure platform are not straightforward. In our on-site research, we have investigated two architectures, a cloud-based processing architecture and an edge computing-based one, in large-scale poultry farming circumstances. These results underscore th
APA, Harvard, Vancouver, ISO, and other styles
46

Researcher. "Artificial Intelligence Driven Decision Systems for Optimizing Resource Allocation in Cloud Engineering." ISCSITR -International Journal of Computer Science and Engineering (ISCSITR-IJCSE) 2, no. 1 (2025): 24–30. https://doi.org/10.5281/zenodo.14676873.

Full text
Abstract:
The rise of cloud computing has brought unprecedented opportunities for resource optimization but also significant challenges in efficiently managing resources across dynamic environments. Artificial Intelligence (AI)-driven decision systems offer robust Solutions for optimizing resource allocation by predicting workloads, automating scaling, and minimizing costs. This paper examines AI methodologies for cloud resource allocation, reviews literature up to 2021, and discusses challenges and practical applications.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
47

Shiksha, Rout. "Auditing Change Management in Cloud Computing Environments: New Challenges and Solutions." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–9. https://doi.org/10.5281/zenodo.14065115.

Full text
Abstract:
Cloud computing environments have revolutionized the way organizations operate, offering scalability, flexibility, and cost-efficiency. They also introduce unique challenges to change management auditing, which can impact security, compliance, and overall IT governance. Traditional change management practices are often insufficient due to the dynamic, multi-tenant, and geographically dispersed nature of cloud environments. Key challenges include lack of visibility into service providers internal controls, complex data sovereignty requirements, and dependency on vendor-driven updates. Additiona
APA, Harvard, Vancouver, ISO, and other styles
48

Arcot, Siva Venkatesh. "CTI Integration in Contact Centers: A Comparative Analysis of Security, Scalability, and Challenges in Legacy vs. Cloud-Based Systems." Asian Journal of Research in Computer Science 18, no. 1 (2025): 113–23. https://doi.org/10.9734/ajrcos/2025/v18i1552.

Full text
Abstract:
AIM: Scope of this work aims to explore the integration of Computer Telephony Integration (CTI) in both legacy and cloud-based contact center systems, examining security challenges and integration methods for achieving robust Computer Telephony Integration implementations. Study Design: This study provides a comparative analysis of techniques, methodologies, and integration challenges associated with CTI in legacy on-premises systems and modern cloud-based solutions, with a particular focus on security considerations in both contexts. Place and Duration of Study: This study is based on a revie
APA, Harvard, Vancouver, ISO, and other styles
49

Tawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions." Applied Sciences 10, no. 12 (2020): 4102. http://dx.doi.org/10.3390/app10124102.

Full text
Abstract:
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers
APA, Harvard, Vancouver, ISO, and other styles
50

Arif, Tuba, Byunghyun Jo, and Jong Hyuk Park. "A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats." Sensors 25, no. 8 (2025): 2350. https://doi.org/10.3390/s25082350.

Full text
Abstract:
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native environments. Specifically, a variety of solutions are covered, such as runtime protection platforms for real-time threat detection and responses, cloud-native endpoint security solutions for ensuring trust and resilience in dynamic contexts, and service
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!