Switch to: References

Add citations

You must login to add citations.
  1. Zero Trust Architecture for Business Data Security: Principles, Implementation, and Best Practices.Saurabh Jadhav Vaibhav Dond, Omkar Gawali, Mangesh Bhise - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1659-1667.
    n the face of evolving cybersecurity threats, businesses must adopt more robust security frameworks to protect sensitive data. Traditional perimeter-based security models are no longer sufficient, especially with the rise of remote work, cloud computing, and mobile devices. Zero Trust Architecture (ZTA) is a modern security model that assumes no trust by default, whether inside or outside the corporate network. This paper explores the core principles of Zero Trust, how businesses can implement this model effectively, and the key benefits it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Future of Serverless Computing: Pushing the Boundaries of Cost Efficiency and Scalability in the Cloud.Satish Patkar Shraddha Sayali - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):359-363.
    Serverless computing has become a pivotal model in cloud computing, offering the promise of reducing operational overhead, improving cost efficiency, and enabling scalable solutions without the need to manage infrastructure. This paradigm allows developers to focus purely on application logic while abstracting away the complexities of server management. As serverless computing evolves, it is pushing the boundaries of cloud architectures by enabling dynamic scaling and cost-effective resource utilization. This paper explores the future trajectory of serverless computing, focusing on its potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Cloud defense: Building Resilient Security Layers.Manoj Jha Pravin Kumar Borkar - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (3):706-711.
    Cloud computing has revolutionized how businesses operate by providing scalable infrastructure, cost efficiency, and flexibility. However, as organizations increasingly migrate sensitive data and mission-critical applications to the cloud, securing these resources has become more complex. This paper explores the concept of building resilient security layers in the cloud, an essential approach to mitigate cyber threats and safeguard digital assets. We examine the various security challenges in cloud environments, including data breaches, misconfigurations, and insider threats, and offer solutions to address them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Optimizing Hybrid Cloud Architectures with Azure Arc in the Era of Multi-Cloud.Ramesh Gaikwad Aravind - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):770-774.
    As organizations increasingly adopt multi-cloud and hybrid cloud strategies, the need for efficient management of resources across diverse cloud environments becomes more complex. Azure Arc, a key offering from Microsoft, enables organizations to extend Azure services and management to any infrastructure, whether on-premises, in other clouds, or at the edge. By offering a unified platform for managing hybrid and multi-cloud environments, Azure Arc enhances governance, security, and resource optimization across various infrastructures. This paper explores how Azure Arc optimizes hybrid cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cloudshield: The Future of Cloud Security.Asma Tabassum Ateeb Baig H. - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):493-497.
    Cloud computing has become an integral part of modern IT infrastructure, enabling organizations to store, process, and manage data with unprecedented flexibility and scalability. However, as more critical and sensitive data moves to the cloud, the need for robust security mechanisms becomes increasingly vital. This paper introduces "CloudShield," a forward-thinking security framework designed to address the emerging challenges of cloud security. We explore the core components of this model, including AI-powered threat detection, enhanced encryption protocols, decentralized access management, and compliance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Blockchain Integration with SAP for Transparent and Secure Financial Transactions.Kanishka R. Vaisshnavi Kadiyala - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):764-769.
    In an increasingly digital world, ensuring the security and transparency of financial transactions is paramount for businesses across industries. Blockchain technology, known for its decentralized, immutable ledger, offers a transformative solution to enhance financial transaction security, traceability, and transparency. SAP, a global leader in enterprise resource planning (ERP) systems, is integrating blockchain technology into its platforms to provide organizations with secure, transparent, and efficient financial processes. By leveraging blockchain in SAP S/4HANA, SAP Cloud Platform, and SAP Leonardo, businesses can enable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Beyond The Cloud: Mastering Security in the Digital Age.Rupali Sharma Omkar C. Patil, Yash D. Patil - 2025 - International Journal of Advanced Research in Education and Technology 12 (1):240-247.
    As digital transformation accelerates, organizations are increasingly reliant on cloud-based services for flexibility, scalability, and cost-efficiency. However, the proliferation of cloud technologies has introduced new, sophisticated cybersecurity challenges. The traditional perimeter-based security model is no longer sufficient in safeguarding critical data and applications. This paper explores the evolving landscape of cybersecurity in the context of cloud computing and presents strategies for mastering security in the digital age. We discuss the importance of securing cloud-native applications, the role of advanced technologies such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • AI-Driven Cloud Security: Automating Threat Detection and Response with Advanced Machine Learning Algorithms.Prathiksha Subhakar, Unnati K. - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (1):381-386.
    As the adoption of cloud computing continues to increase, securing cloud environments has become an ever-growing concern. Traditional security models struggle to keep up with the evolving nature of cyber threats, making it essential for organizations to explore innovative approaches. This paper explores how artificial intelligence (AI) and machine learning (ML) can enhance cloud security by automating threat detection, response, and mitigation in real-time. Through the application of advanced ML algorithms, AI-driven security systems can identify and predict security incidents, classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cloud Security Unlocked: Safeguarding the Digital Frontier.Godse Rahul Vishwakarma Prem, Sanjay Kumar - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (2):613-618.
    As businesses and individuals increasingly rely on cloud computing for a vast array of services, the need for robust cloud security becomes ever more critical. Cloud environments offer unparalleled flexibility, scalability, and cost-effectiveness but simultaneously introduce a complex security landscape that poses significant challenges. The importance of safeguarding data, applications, and systems from cyber threats in the cloud is paramount to maintaining the confidentiality, integrity, and availability of digital assets. This paper explores the evolving landscape of cloud security, identifying the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Machine Learning For Autonomous Systems: Navigating Safety, Ethics, and Regulation In.Saurav Choure Aswathy Madhu, Ankita Shinde - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (2):1680-1685.
    Autonomous systems, powered by machine learning (ML), have the potential to revolutionize various industries, including transportation, healthcare, and robotics. However, the integration of machine learning in autonomous systems raises significant challenges related to safety, ethics, and regulatory compliance. Ensuring the reliability and trustworthiness of these systems is crucial, especially when they operate in environments with high risks, such as self-driving cars or medical robots. This paper explores the intersection of machine learning and autonomous systems, focusing on the challenges of ensuring (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cloudsentry: Protecting Your Digital Assets.Shravan Kumar Reuel Reuben, Rishabh Jain - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):789-795.
    With the rise of cloud computing, businesses have rapidly transitioned to cloud-based infrastructures to reap the benefits of scalability, flexibility, and cost-efficiency. However, this shift has introduced a new set of security challenges, particularly in protecting digital assets and sensitive data stored in cloud environments. The importance of securing these digital assets has become more pronounced as cyber threats become increasingly sophisticated. This paper introduces CloudSentry, a comprehensive security framework designed to protect digital assets in cloud environments. The framework focuses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Safe in the Cloud: The Evolution of Security.Daspute Krishna Sayyad Jindavali, Dudhe Jitesh, Jadhav Shambhuraj - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (2):1686-1691.
    As cloud computing continues to dominate the digital landscape, it has introduced new avenues for businesses to operate with enhanced flexibility, scalability, and cost-efficiency. However, this rapid adoption of cloud technologies also brings forth critical security challenges. The evolution of security within the cloud ecosystem is essential to safeguard digital assets from emerging threats. This paper traces the evolution of cloud security, from traditional on-premise solutions to advanced cloud-native security frameworks. It discusses the various security paradigms, tools, and technologies that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Unlocking the Power of SAP: Transforming Businesses with Integrated Solutions.Preethika T. S. Santhosh, Suriya Prakash R. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1117-1124.
    The growing complexity of business operations in today’s global economy has created an increasing demand for integrated enterprise resource planning (ERP) systems. SAP, as a leading provider of ERP solutions, has become a transformative tool for businesses seeking to streamline operations, enhance productivity, and maintain competitive advantages. This paper explores how SAP’s integrated solutions enable businesses to efficiently manage key operations, from supply chain management to finance, human resources, and customer relationship management. We analyze the various components of SAP, focusing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cloud-Assisted Edge AI: Enhancing Decision Making in IoT Devices with Cloud-Powered Machine Learning Models.Hitesh A. Solanki Urvi C. Gupta, Roshni P. Adiyecha - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20850-20857.
    The Internet of Things (IoT) is transforming industries by enabling devices to gather and share data. However, IoT devices often face limitations in processing power, storage, and energy consumption, restricting their ability to make complex decisions in real time. To address these challenges, cloud-assisted edge AI combines the advantages of edge computing and cloud-powered machine learning models, enabling IoT devices to make intelligent decisions at the edge while leveraging cloud resources for more complex processing tasks. This paper explores the integration (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cloud-based Document Collaboration System.Sureshp Rahulson M., Sathish T., Srireguram - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (2):1692-1699.
    A Cloud-based Document Collaboration System (CDCS) enables multiple users to work together on documents in real time, leveraging the power of cloud computing to facilitate seamless and efficient collaboration. With increasing reliance on cloud technologies, such systems have revolutionized how teams, organizations, and individuals manage, edit, and share documents. This paper presents an overview of Cloud-based Document Collaboration Systems, focusing on the architecture, key features, benefits, challenges, and popular platforms. Additionally, we discuss the underlying technologies that enable collaboration, including cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Developing Machine Learning Models for Real-Time Fraud Detection in Online Transactions.R. S. Mandlo Mayuri Sunhare - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (2):465-472.
    The increasing volume of online transactions has heightened the risk of fraud, making real-time fraud detection crucial for safeguarding financial systems. This paper explores the development and application of machine learning (ML) models for detecting fraudulent activities in real-time online transactions. The study investigates various ML algorithms, including supervised and unsupervised learning techniques, to identify patterns indicative of fraud. We evaluate the performance of different models based on accuracy, precision, recall, and F1-score. The results show that ensemble methods and deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • How Generative AI is shaping the Future of Content.R. G. Kanishka Kavinkumar M. - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (3):755-769.
    Generative Artificial Intelligence (AI) has emerged as a transformative tool in the content creation process, significantly altering the way content is produced, personalized, and consumed. From text and images to videos and music, generative AI is enabling creators and businesses to automate and innovate content generation, facilitating personalized experiences at scale. With technologies such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Transformer models, generative AI can create high-quality content autonomously, blurring the lines between human and machine-generated material. This (...)
    Download  
     
    Export citation  
     
    Bookmark