Results for ' Cloud Security, Cybersecurity, Data Breach, Encryption, Authentication, Cloud Service Providers, Compliance, AI in Cloud Security, Cyber Threats, Cloud Infrastructure.'

989 found
Order:
  1.  6
    Guardians of the Cloud: Securing the Digital Sky.Sree M. Harini - 2022 - International Journal of Multidisciplinary and Scientific Emerging Research 10 (4):1611-1614.
    The rapid growth of cloud computing has revolutionized how businesses and individuals store and access data. However, as the digital landscape expands, it becomes increasingly vulnerable to cyber threats. This paper delves into the security challenges and solutions in cloud computing, exploring various risks including data breaches, service interruptions, and unauthorized access. We examine the layers of security measures required to protect data in cloud environments, from encryption and authentication protocols to network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  29
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  3.  16
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  7
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  45
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  4
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  34
    Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have liberated (...) analytics to run on the cloud with advanced capabilities to churn out actionable insights to optimize operations and create personalized offerings for their customers. Sensitive customer data and important systems are securely protected from cyber security threats by a robust cybersecurity layer, which includes data encryption, controls access, and detects threats proactively. Integration and cloud adoption challenges like costly implementation, cybersecurity risk and legacy system migration will be handled by deft and effective strategies such as phased adoption, workforce upskilling and adoption of a zero-trust security model. Within operational efficiency, stronger resilience and innovative business models enabled, i.e. behavior-based insurance pricing through IoT and real time analytics, are the opportunities. However, moisture and regulatory complexity can be barriers to change, and investments in modern technology, workforce development, and partnerships with insurtech and cybersecurity experts can enable insurers to survive and thrive in a more competitive, digital-first landscape. This convergence engenders customer trust, unlocks its operational agility and ensures compliance with changing requirements, thereby enabling insurers to sustain their growth, build resilience and rival digital transformation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  45
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  8
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  56
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  31
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  13.  30
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  99
    Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  15.  30
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  16.  47
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  5
    Cybersecurity and Network Engineering: Bridging the Gap for Optimal Protection.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):2701-2706.
    : In the digital age, cybersecurity and network engineering are two integral disciplines that must operate in unison to safeguard information and ensure the resilience of modern systems. While network engineering focuses on designing, implementing, and maintaining infrastructure, cybersecurity emphasizes protecting this infrastructure and its data from threats. This research explores the intricate relationship between these domains, advocating for a unified approach to achieve optimal protection in an increasingly interconnected world. The study highlights the evolving threat landscape characterized by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  5
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  20.  6
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  17
    Next-Generation Cloud Security Frameworks:Balancing Privacy, Compliance, and Data Protection in a Digital-First Era.Varad Upadhye Atharva Hasabnis - 2025 - International Journal of Advanced Research in Education and Technology (Ijarety) 12 (2):453-457.
    As businesses increasingly migrate to cloud environments, the need for robust and adaptive cloud security frameworks becomes paramount. Cloud services provide numerous benefits such as scalability, flexibility, and cost-efficiency, but they also introduce significant risks in terms of privacy, compliance, and data protection. This paper explores the evolving landscape of cloud security, focusing on next-generation frameworks that aim to balance the often-competing demands of privacy, regulatory compliance, and data protection. We analyze emerging security models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  53
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  31
    ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  24.  39
    Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI.Adavelli Sateesh Reddy - 2023 - International Journal of Computer Science and Information Technology Research 4 (2):29-52.
    By integration with cloud computing, cybersecurity and generative AI, the insurance industry is being transformed from high efficiency, low cost, and better customer service. However, these advanced technologies can also be used by insurers to automate and streamline processes like claims handling, underwriting, and policy generation, which are majorly time consuming and error prone. In predictive analytics, fraud detection, and personalized customer experience, generative AI makes it possible for insurers to mitigate risks and, at the same time, provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  20
    Cybersecurity Risk Management in the Era of Remote Work and Cloud Computing.Dhivya K. - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1637-1641.
    The rise of remote work and the widespread adoption of cloud computing have transformed the digital landscape, providing organizations with flexibility and scalability. However, these advancements have also introduced new cybersecurity challenges. Traditional security frameworks, which focus on perimeter defenses, are increasingly inadequate in securing cloud-based environments and remote workforces. This paper explores the evolving landscape of cybersecurity risk management in the context of remote work and cloud computing. It investigates the unique risks associated with these technologies, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  13
    Just-in-Time Access for Databases: Harnessing AI for Smarter, Safer Permissions.Attaluri Vivekchowdary - 2023 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 12 (4):4702-4712.
    In the evolving landscape of data security, traditional access control mechanisms often fall short in addressing dynamic and context-specific requirements. As data breaches become more sophisticated, organizations require more adaptive and intelligent access control strategies. This paper explores the integration of Artificial Intelligence (AI) into Just-in-Time (JIT) access control models to enhance database security. By leveraging AI, we aim to create adaptive, context-aware permission systems that grant access precisely when needed, reducing the attack surface and mitigating unauthorized access (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid (...) environment. These strategies aim to balance conflicting objectives such as cost-efficiency, performance optimization, security, and compliance with regulatory standards. This exploratory research focused on evaluating the efficiency and limitations of different configuration strategies in hybrid cloud environments. Findings indicate that each approach presents distinct advantages. Improving resource utilization and automating governance processes are significant advantages of Policy-based Resource Management, which leads to costeffectiveness. Intelligent routing of traffic is a feature of Cross-cloud Load Balancing, resulting in optimized performance and higher service availability. By centralizing control, the Hybrid Cloud Service Mesh allows for secure and streamlined cross-service communication. A notable feature of Cross-cloud Container Orchestration is its ability to simplify the migration of applications across diverse cloud environments. For immediate threat detection and regulatory compliance, real-time monitoring is facilitated by Log Management and Analytics. However, Policy-based Resource Management can be complex and inflexible. Extra costs for data transfer between different cloud providers are a drawback of Crosscloud Load Balancing. Additional network hops create latency issues in Hybrid Cloud Service Mesh configurations. If configured incorrectly, Cross-cloud Container Orchestration could expose the system to security risks. Finally, Log Management and Analytics require both ample storage and advanced analytical capabilities. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  28.  56
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple (...) servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an additional layer of security. We also explore various optimization algorithms to improve the efficiency of encryption and dispersion processes, thereby reducing computational overhead while maintaining high security. The implementation of this framework is evaluated on multiple cloud platforms, demonstrating its effectiveness in safeguarding data with minimal performance impact. Future enhancements may include integrating machine learning algorithms to predict and adapt to new security threats in real time, further solidifying the reliability of cloud storage solutions. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  71
    Design of Cybersecurity Smart Controller For Grid Connected Microgrid.Soma Abhiram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-15.
    The research introduces to the design and implementation of the Cybersecurity Enabled Smart Controller for the grid connected microgrid which uses the combination of the Web technologies and the authentication mechanism which enables real time monitoring with help of the Dashboards built using Chart.js which is a framework of JavaScript. Due to the role and connection of the Microgrids with the critical infrastructure they are vulnerable to the cyber threats. This project leverages the use of HTML, CSS, JavaScript and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  51
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  36
    Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (8):12040-12049.
    The digitization process has brought new opportunities in insurance industry operations and innovations but has also revealed major weaknesses. Since more and more actual insurers use Guidewire to handle claims, policies, and customer data, insurers become targets for cyber threats that target valuable information. The framework of Guidewire, along with cloud computing integrated API and third-party tools, is laden with numerous exposure points. These security gaps are utilized to execute phishing, spread malware and gain unauthorized access to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  17
    AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  34.  26
    Secure Sharing of Personal Health Record in Cloud Environment.V. Tamilarasi E. Saranya - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):532-536.
    In cloud secure personal data sharing is the important issues because it creates several securities and data confidentiality problem while accessing the cloud services. Many challenges present in personal data sharing such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Personal Health Information Sharing system. Personal health records must be encrypted to protect privacy before outsourcing to the (...). Aiming at solving the above challenges, here propose an efficient data sharing mechanism for Personal Data Sharing, which not only achieves data privacy, fine-grained access control and authority delegation simultaneously, but also optimizes the computation efficiency and is suitable for resource constrained servers. Most of the data consumers are honest, while few of them are corrupt and will leakage their secret keys in the collusion. On the contrary, PKG and data owner are assumed to be fully trusted. Besides, public cloud 1 and public cloud 2 cannot collude with each other. The non-collusive assumption is reasonable, because the client can demand that two cloud servers cannot reveal users’ information by contract. In proposed work, PR-ABE (Attribute Based Encryption with Proxy Re-encryption) technique implements to provide secure encryption of medical data. To improve the access control, here partial key sharing scheme will be implement. Using this, data owner can send partial secret key for the requested user. This approach overcomes the key guessing attack in data retrieval process. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  10
    Advanced Data Integration for Smart Healthcare: Leveraging Blockchain and AI Technologies.A. Manoj Prabaharan - 2024 - Journal of Artificial Intelligence and Cyber Security (Jaics) 8 (1):1-7.
    The healthcare sector is undergoing a transformative shift towards smart healthcare, driven by advancements in technology, including Artificial Intelligence (AI) and Blockchain. As healthcare systems generate vast amounts of data from multiple sources, such as electronic health records (EHRs), medical imaging, wearable devices, and sensor-based monitoring, the challenge lies in securely integrating and analyzing this data for real-time, actionable insights. Blockchain technology, with its decentralized, immutable, and transparent framework, offers a robust solution for securing data integrity, privacy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  26
    Sustainable Access Management for Cloud Instances With SSH Securing Cloud Infrastructure With PAM Solutions.Vivekchowdary Attaluri Subash Banala - 2025 - Igi Global Scientific Publishing 1 (1):321-340.
    In the era of cloud computing, securing access to cloud instances is paramount for protecting sensitive data and ensuring compliance with industry standards. Secure Shell (SSH) access management plays a critical role in safeguarding cloud environments by controlling how users interact with cloud-based systems. However, traditional SSH access management methods can often be cumbersome, error-prone, and vulnerable to breaches. This paper explores the implementation of Privileged Access Management (PAM) solutions for enhancing the security of SSH (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  19
    AI-Powered Cybersecurity: Leveraging Deep Learning for Real-Time Threat Detection in Financial Services.Tripathi Praveen - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (8):10540-10542.
    The rise in cyber threats targeting financial institutions has led to the adoption of artificial intelligence (AI) and deep learning models to mitigate risks and detect fraud in real-time. This paper explores AI-powered cybersecurity frameworks that enhance fraud detection, risk analytics, and compliance automation in financial transactions.
    Download  
     
    Export citation  
     
    Bookmark  
  39.  37
    Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support customer engagement. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  47
    The Future of Cybersecurity: Emerging Threats and Mitigation Strategies.Swapna V. Sneha P. - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 8 (12):1306-1312.
    As technology rapidly advances, the landscape of cybersecurity faces increasingly complex and evolving threats. This paper explores the future of cybersecurity, focusing on emerging threats and the corresponding mitigation strategies. Key threats include AI-driven attacks, ransomware evolution, quantum computing vulnerabilities, IoT security risks, cloud security challenges, and supply chain attacks. These threats have the potential to disrupt organizations and compromise sensitive data on an unprecedented scale. To address these challenges, the paper outlines effective mitigation strategies such as leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  16
    Autonomous Cloud Operations: Self-Optimizing Cloud Systems Powered By AI and Machine Learning.G. Geethanjali - 2013 - International Journal of Innovative Research in Computer and Communication Engineering 13 (3):2138-2143.
    The exponential growth of cloud computing has revolutionized the IT industry by providing scalable, flexible, and cost-efficient infrastructure solutions. However, as cloud systems become more complex, managing and optimizing these environments becomes increasingly challenging. Traditional cloud management methods often require manual intervention and significant resources to maintain performance, cost-efficiency, and security. Autonomous cloud operations, powered by artificial intelligence (AI) and machine learning (ML), represent the next frontier in cloud management. By leveraging advanced algorithms and real-time (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  13
    Protecting the Hadoop Cluster on the Basis of Big Data Security.Pamarthi Kartheek - 2023 - Journal of Artificial Intelligence, Machine Learning and Data Science 1 (3):831-837.
    Gathering and analyzing enormous volumes of data is known as "big data," and it includes information from users, sensors, healthcare providers, and companies. Using the Hadoop framework, large amounts of data are stored, managed, and dispersed across multiple server nodes. Big Data issues, including security holes in the Hadoop Distributed File System (HDFS), the architecture's core layer, are highlighted in this article. The methodology includes setting up a Hadoop environment, integrating Kerberos for authentication, enabling HDFS encryption (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  43.  40
    An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data.R. Sugumar - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish (...)
    Download  
     
    Export citation  
     
    Bookmark   53 citations  
  44.  67
    AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities.Tripathi Praveen - 2024 - International Journal of Computer Trends and Technology 72 (8):26-32.
    In 2024, the intersection of artificial intelligence (AI) and cybersecurity presents both unprecedented challenges and significant opportunities. This article explores the evolving landscape of AI-driven cyber threats, the advancements in AI-enabled security measures, and the strategic responses required to navigate these new realities. Leveraging statistics, trends, and expert insights, we delve into how organizations can enhance their cybersecurity posture in the face of sophisticated AI threats.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  45.  56
    COMPARATIVE REVIEW: TOP CLOUD SERVICE PROVIDERS ETL TOOLS - AWS VS. AZURE VS. GCP.Borra Praveen - 2024 - International Journal of Computer Engineering and Technology 15 (3):203-208.
    ETL (Extract, Transform, Load) tools play a crucial role in contemporary data management by enabling the extraction, transformation, and loading of data from various sources into designated systems for analysis and reporting purposes. Major cloud service providers including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) give robust ETL solutions tailored to diverse business needs. This document presents a comparative assessment of the primary ETL tools offered by AWS, Azure, and GCP—namely, AWS (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  31
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  47. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  37
    Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  30
    The Role of AI in Automated Threat Hunting.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-10.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 989