Results for ': Multi-Cloud, Resilience, Disaster Recovery, High Availability, Cloud Architecture, Redundancy, Backup Strategies, Failover, Data Replication, Cloud Service Providers, Business Continuity'

980 found
Order:
  1.  35
    Leveraging Multi-Cloud Strategies for Resilience and Disaster Recovery: Architecting Redundancy for High Availability and Continuity.Pushpendra Kushwaha Harendra Rathore - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1111-1116.
    In today’s digital landscape, businesses face increasing pressure to maintain service continuity and data availability, especially in the face of potential service disruptions or disasters. Traditional single-cloud deployments can be vulnerable to outages, data loss, and geographical limitations. As a result, multi-cloud strategies have emerged as a solution for achieving higher resilience, disaster recovery (DR), and business continuity. By leveraging multiple cloud service providers (CSPs), organizations can architect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  47
    Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  49
    Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  56
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  26
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  34
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  7.  27
    Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  41
    Next-Generation Cloud Security Frameworks:Balancing Privacy, Compliance, and Data Protection in a Digital-First Era.Varad Upadhye Atharva Hasabnis - 2025 - International Journal of Advanced Research in Education and Technology (Ijarety) 12 (2):453-457.
    As businesses increasingly migrate to cloud environments, the need for robust and adaptive cloud security frameworks becomes paramount. Cloud services provide numerous benefits such as scalability, flexibility, and cost-efficiency, but they also introduce significant risks in terms of privacy, compliance, and data protection. This paper explores the evolving landscape of cloud security, focusing on next-generation frameworks that aim to balance the often-competing demands of privacy, regulatory compliance, and data protection. We analyze emerging security models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  32
    Optimizing Hybrid Cloud Architectures with Azure Arc in the Era of Multi-Cloud.Ramesh Gaikwad Aravind - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):770-774.
    As organizations increasingly adopt multi-cloud and hybrid cloud strategies, the need for efficient management of resources across diverse cloud environments becomes more complex. Azure Arc, a key offering from Microsoft, enables organizations to extend Azure services and management to any infrastructure, whether on-premises, in other clouds, or at the edge. By offering a unified platform for managing hybrid and multi-cloud environments, Azure Arc enhances governance, security, and resource optimization across various infrastructures. This paper explores (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  73
    Cloud Architecture Design Patterns: Best Practices for Scalable and Secure Systems.Nivisha Govindaraj Ram Nivas Duraisamy - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):691-697.
    Cloud computing has transformed how businesses design, deploy, and manage applications. With its ability to provide on-demand resources and scalability, cloud platforms offer significant benefits in terms of flexibility, cost-efficiency, and speed. However, to fully leverage these advantages, it is crucial to apply proven design patterns that ensure the cloud architecture is both scalable and secure. This paper explores key cloud architecture design patterns, including microservices, serverless architecture, multi-cloud, and hybrid cloud, along with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  20
    Cybersecurity and Network Engineering: Bridging the Gap for Optimal Protection.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):2701-2706.
    : In the digital age, cybersecurity and network engineering are two integral disciplines that must operate in unison to safeguard information and ensure the resilience of modern systems. While network engineering focuses on designing, implementing, and maintaining infrastructure, cybersecurity emphasizes protecting this infrastructure and its data from threats. This research explores the intricate relationship between these domains, advocating for a unified approach to achieve optimal protection in an increasingly interconnected world. The study highlights the evolving threat landscape characterized by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Single Valued Neutrosophic HyperSoft Set based on VIKOR Method for 5G Architecture Selection.Florentin Smarandache, M. Ali Ahmed & Ahmed Abdelhafeez - 2024 - International Journal of Neutrosophic Science 23 (2):42-52.
    This work introduces the framework for selecting architecture in 5G networks, considering various technological, performance, economic, and operational factors. With the emergence of 5G technology, the architecture selection process has become pivotal in meeting diverse requirements for ultra-high-speed connectivity, low latency, scalability, and diverse service demands. The evaluation comprehensively analyses different architecture options, including centralized, distributed, cloud-based, and virtualized architectures. Factors such as network performance, scalability, cost-effectiveness, security, and compatibility are considered within a multi-criteria decision-making framework. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  38
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  14.  64
    Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive maintenance. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. CONTEMPORARY DEVOPS STRATEGIES FOR AUGMENTING SCALABLE AND RESILIENT APPLICATION DEPLOYMENT ACROSS MULTI-CLOUD ENVIRONMENTS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):54-60.
    Containerization in a multi-cloud environment facilitates workload portability and optimized resource uti-lization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of containerization in multi-cloud environment. We conducted the Systematic Mapping Study (SMS) on the literature (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  16.  35
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  21
    Cloud Security Unlocked: Safeguarding the Digital Frontier.Godse Rahul Vishwakarma Prem, Sanjay Kumar - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (2):613-618.
    As businesses and individuals increasingly rely on cloud computing for a vast array of services, the need for robust cloud security becomes ever more critical. Cloud environments offer unparalleled flexibility, scalability, and cost-effectiveness but simultaneously introduce a complex security landscape that poses significant challenges. The importance of safeguarding data, applications, and systems from cyber threats in the cloud is paramount to maintaining the confidentiality, integrity, and availability of digital assets. This paper explores the evolving landscape (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  19
    Enhancing Security of Cloud-Native Microservices with Service Mesh Technologies.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1.
    : As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  72
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  30
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  21
    AI-Powered Cloud Migration: Automating the Transition from On-Premises to Cloud Environments with Zero Downtime.M. Vaidhegi G. Glory - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):747-752.
    : As organizations continue to embrace cloud computing, the migration of workloads, applications, and data from on-premises environments to the cloud remains one of the most critical tasks. However, migrating to the cloud is often seen as a daunting task due to the complexity, the risk of downtime, and the potential for service disruptions. Artificial Intelligence (AI) and automation have emerged as transformative technologies for cloud migration, providing solutions that enable a seamless, efficient, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Cloud Migration Strategies for Mainframe Modernization: A Comparative Study of AWS, Azure, and GCP.Govindaraj Vasanthi - 2024 - International Journal of Computer Trends and Technology 72 (10):57-65.
    Mainframe systems have a track record of reliability, but they need help in today’s fast-changing business world. These include high upkeep expenses and limited room for growth. This paper looks at three top cloud platforms—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—to update old mainframe programs. We compare them in detail, looking at what each does best. AWS has a wide range of tools to move data. Azure works well with cloud (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  23.  38
    Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
    Cloud computing has revolutionized data management for businesses and individuals a like, ushering in an era of unprecedented accessibility and scalability. As demand for cloud services continues to surge, the imperative for efficient and secure systems becomes paramount. One approach to meeting this challenge is the consolidation of virtual machines onto fewer physical servers, optimizing resource utilization and yielding significant energy savings. Moreover, this consolidation strategy bolsters overall security by enabling more effective monitoring and control of virtual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  11
    Data Sovereignty in the Cloud: Navigating Regulatory and Compliance Challenges in a Globalized Digital Economy.Trivedi Varun D. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (1):782-787.
    The growing reliance on cloud computing has introduced significant challenges surrounding data sovereignty, especially in a globalized digital economy. Data sovereignty refers to the legal and regulatory frameworks that govern where and how data can be stored, processed, and accessed based on the country or jurisdiction in which it resides. With cloud services enabling businesses to store and access data from multiple locations worldwide, navigating the complex web of national regulations has become a major (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  52
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  46
    AI-Driven Synthetic Data Generation for Financial Product Development: Accelerating Innovation in Banking and Fintech through Realistic Data Simulation.Debasish Paul Rajalakshmi Soundarapandiyan, Praveen Sivathapandi - 2022 - Journal of Artificial Intelligence Research and Applications 2 (2):261-303.
    The rapid evolution of the financial sector, particularly in banking and fintech, necessitates continuous innovation in financial product development and testing. However, challenges such as data privacy, regulatory compliance, and the limited availability of diverse datasets often hinder the effective development and deployment of new products. This research investigates the transformative potential of AI-driven synthetic data generation as a solution for accelerating innovation in financial product development. Synthetic data, generated through advanced AI techniques such as Generative Adversarial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  25
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  49
    EVALUATION OF TOP CLOUD SERVICE PROVIDERS' BI TOOLS: A COMPARISON OF AMAZON QUICKSIGHT, MICROSOFT POWER BI, AND GOOGLE LOOKER.Borra Praveen - 2024 - International Journal of Computer Engineering and Technology 15 (3):150-156.
    Business intelligence (BI) and data visualization tools play a pivotal role in today's businesses by facilitating data-driven decision-making. Amazon's AWS, Microsoft's Azure, and Google's GCP are the three foremost cloud service providers, providing extensive solutions encompassing computing, storage, databases, and advanced cloud services. This paper delivers a thorough comparative analysis of three top BI platforms: Amazon Studio, Microsoft Power BI, and Google Looker. It evaluates their features, user-friendliness, integration options, pricing structures, and customer support. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Quality of Services and Its Role in Enhancing Strategic Flexibility in Non-Governmental Hospitals.Zahi O. Abu-Nahel, Wafiq H. Alagha, Mazen J. Al Shobaki, Samy S. Abu-Naser & Suliman A. El Talla - 2020 - International Journal of Academic Accounting, Finance and Management Research(IJAAFMR) 4 (10):38-56.
    Abstract: The study aimed to determine the quality of services and its role in enhancing strategic flexibility, from the point of view of the internal beneficiary in non-governmental hospitals in Gaza Strip. The study relied on the descriptive and analytical approach, and the questionnaire was designed as a tool to collect data and consisted of (39) items, and the researchers used the comprehensive survey method, and the number of the study population was (536) individuals, where (434) questionnaires were retrieved, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  32
    Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid (...) environment. These strategies aim to balance conflicting objectives such as cost-efficiency, performance optimization, security, and compliance with regulatory standards. This exploratory research focused on evaluating the efficiency and limitations of different configuration strategies in hybrid cloud environments. Findings indicate that each approach presents distinct advantages. Improving resource utilization and automating governance processes are significant advantages of Policy-based Resource Management, which leads to costeffectiveness. Intelligent routing of traffic is a feature of Cross-cloud Load Balancing, resulting in optimized performance and higher service availability. By centralizing control, the Hybrid Cloud Service Mesh allows for secure and streamlined cross-service communication. A notable feature of Cross-cloud Container Orchestration is its ability to simplify the migration of applications across diverse cloud environments. For immediate threat detection and regulatory compliance, real-time monitoring is facilitated by Log Management and Analytics. However, Policy-based Resource Management can be complex and inflexible. Extra costs for data transfer between different cloud providers are a drawback of Crosscloud Load Balancing. Additional network hops create latency issues in Hybrid Cloud Service Mesh configurations. If configured incorrectly, Cross-cloud Container Orchestration could expose the system to security risks. Finally, Log Management and Analytics require both ample storage and advanced analytical capabilities. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  34.  65
    COMPARATIVE REVIEW: TOP CLOUD SERVICE PROVIDERS ETL TOOLS - AWS VS. AZURE VS. GCP.Borra Praveen - 2024 - International Journal of Computer Engineering and Technology 15 (3):203-208.
    ETL (Extract, Transform, Load) tools play a crucial role in contemporary data management by enabling the extraction, transformation, and loading of data from various sources into designated systems for analysis and reporting purposes. Major cloud service providers including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) give robust ETL solutions tailored to diverse business needs. This document presents a comparative assessment of the primary ETL tools offered by AWS, Azure, and GCP—namely, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  68
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  83
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  45
    Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2020 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-1294.
    The global shift to remote work has greatly increased the potential targets for cyberattacks, demanding stronger security measures than what Virtual Private Networks (VPNs) can provide. VPNs provide a bottom-line layer of security but don’t address the changing complexity of the distributed world of work. In this paper, we discuss advanced security frameworks and best practices to protect data and identity in a purely remote work setting, focusing on threat mitigation. The discussed key strategies include Zero Trust Architecture (ZTA), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Zero Trust Architecture for Business Data Security: Principles, Implementation, and Best Practices.Saurabh Jadhav Vaibhav Dond, Omkar Gawali, Mangesh Bhise - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1659-1667.
    n the face of evolving cybersecurity threats, businesses must adopt more robust security frameworks to protect sensitive data. Traditional perimeter-based security models are no longer sufficient, especially with the rise of remote work, cloud computing, and mobile devices. Zero Trust Architecture (ZTA) is a modern security model that assumes no trust by default, whether inside or outside the corporate network. This paper explores the core principles of Zero Trust, how businesses can implement this model effectively, and the key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  42
    An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data.R. Sugumar - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish (...)
    Download  
     
    Export citation  
     
    Bookmark   59 citations  
  42. Strategic Flexibility and Its Relationship to the Level of Quality of Services Provided in Non-Governmental Hospitals.Zahi O. Abu-Nahel, Wafiq H. Alagha, Mazen J. Al Shobaki, Samy S. Abu-Naser & Suliman A. El Talla - 2020 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (10):57-84.
    Abstract: The study aimed to determine the strategic flexibility and its relationship to the level of quality of services provided, from the viewpoint of the internal beneficiary in non-governmental hospitals in Gaza Strip. The study relied on the descriptive and analytical approach, and the questionnaire was designed as a tool to collect data and consisted of (39) items, and the researchers used the comprehensive survey method, and the number of the study population was (536) individuals, where (434) questionnaires were (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. Strategies for Healthcare Disaster Management in the Context of Technology Innovation: the Case of Bulgaria.Radostin Vazov, R. Kanazireva, T. Grynko & Oleksandr P. Krupskyi - 2024 - Medicni Perspektivi 29 (2):215-228.
    In Bulgaria, integrating technology and innovation is crucial for advancing sustainable healthcare disaster management, enhancing disaster response and recovery, and minimizing long-term environmental and social impacts. The purpose of the study is to assess the impact of modern technological innovations on the effectiveness of disaster management in health care in Bulgaria with a focus on Health Information Systems (HIS), Telemedicine, Telehealth, e-Health, Electronic Health Records, Artificial Intelligence (AI), Public Communication Platforms, and Data Security and Privacy. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  55
    A Balanced Economic Model: The Feedback Loop Between Public and Private Sectors with MMT as a Stabilizing Mechanism.Angelito Malicse - manuscript
    A Balanced Economic Model: The Feedback Loop Between Public and Private Sectors with MMT as a Stabilizing Mechanism -/- Introduction -/- Modern capitalism thrives on competition, profit motives, and consumer demand. However, the system is flawed because it allows extreme wealth inequality, market instability, and frequent economic crashes. Advertising, as an essential part of capitalism, manipulates consumer behavior to sustain profits. While this fuels economic growth, it also distorts the real needs of society. -/- A better alternative Is a hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  43
    Creativity and Intelligence: Emergent Properties of the Brain as a Balancing Mechanism for Overpopulation, Natural Disasters, and Diseases.Angelito Malicse - manuscript
    Creativity and Intelligence: Emergent Properties of the Brain as a Balancing Mechanism for Overpopulation, Natural Disasters, and Diseases -/- The human brain is an extraordinary organ, capable of producing creativity and intelligence as emergent properties that allow humanity to address complex challenges. These traits are not merely tools for individual survival; they function as collective mechanisms to adapt to large-scale issues that threaten humanity’s balance with the environment. Overpopulation, natural disasters, and the prevalence of diseases and illnesses represent some of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  67
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  76
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  28
    Cloud Computing in the Circular Economy:Redefining Resource Efficiency and Waste Reduction for Sustainable Business Practices.Dwivedi Shashi - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):348-352.
    The transition to a Circular Economy (CE) is a critical strategy in addressing global challenges related to resource depletion, waste generation, and environmental sustainability. Cloud computing, as a scalable and data-driven technology, has a significant role to play in enabling the circular economy by enhancing resource efficiency, waste reduction, and the optimization of product lifecycles. This paper explores how cloud computing facilitates circular economy practices by leveraging advanced technologies such as data analytics, Internet of Things (IoT), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  25
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  24
    Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 980