Results for 'Azure, Legacy Systems, Cloud Migration, Digital Transformation, Best Practices, Cloud Infrastructure, IT Modernization, Cloud Adoption, Scalability, Security, Cloud Optimization'

992 found
Order:
  1.  14
    Migrating Legacy Systems to Azure: Best Practices, Challenges, and Opportunities for Digital Transformation.Dipak Shegaonkar Kartik - 2013 - International Journal of Innovative Research in Computer and Communication Engineering 13 (2):1674-1679.
    As businesses increasingly move towards digital transformation, the migration of legacy systems to the cloud has become a critical step for staying competitive and enhancing operational efficiency. Microsoft Azure, with its wide range of tools and services, offers a robust platform for migrating legacy applications and infrastructure to a cloud environment. This paper discusses the best practices, challenges, and opportunities associated with migrating legacy systems to Azure. It explores the key steps in planning, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  34
    Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have liberated data analytics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  83
    Cloud Migration Strategies for Mainframe Modernization: A Comparative Study of AWS, Azure, and GCP.Govindaraj Vasanthi - 2024 - International Journal of Computer Trends and Technology 72 (10):57-65.
    Mainframe systems have a track record of reliability, but they need help in today’s fast-changing business world. These include high upkeep expenses and limited room for growth. This paper looks at three top cloud platforms—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—to update old mainframe programs. We compare them in detail, looking at what each does best. AWS has a wide range of tools to move data. Azure works well with cloud and on-site (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4.  52
    Cloud Architecture Design Patterns: Best Practices for Scalable and Secure Systems.Nivisha Govindaraj Ram Nivas Duraisamy - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):691-697.
    Cloud computing has transformed how businesses design, deploy, and manage applications. With its ability to provide on-demand resources and scalability, cloud platforms offer significant benefits in terms of flexibility, cost-efficiency, and speed. However, to fully leverage these advantages, it is crucial to apply proven design patterns that ensure the cloud architecture is both scalable and secure. This paper explores key cloud architecture design patterns, including microservices, serverless architecture, multi-cloud, and hybrid cloud, along with (...) practices for achieving scalable and secure systems. Emphasizing security and scalability, it provides guidance for organizations on how to build resilient and high-performing cloud systems. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  5. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  6.  56
    Microsoft Azure Networking: Empowering Cloud Connectivity and Security.Borra Praveen - 2024 - International Journal of Advanced Research in Science, Communication and Technology 4 (3):469-475.
    In the current era dominated by cloud computing, networking infrastructure serves as the backbone of digital operations. Among the top cloud service providers, Microsoft Azure offers a robust suite of networking solutions tailored to meet the evolving needs of modern businesses. This document aims to provide a comprehensive overview of Azure networking, examining its key components, deployment models, best practices, and practical applications. By exploring Azure Virtual Network, Load Balancer, VPN Gateway, ExpressRoute, Firewall, and other services (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7.  30
    Policy Center to the Cloud: An Analysis of AWS and Snowflake’s Role in Cloud-Based Policy Management Solutions.Adavelli Sateesh Reddy - 2021 - Esp Journal of Engineering and Technology Advancements 1 (1):253-261.
    Organizations are migrating their policy management systems from the ground to the cloud, changing how they manage, secure and scale their operations. This paper analyses how Amazon Web Services (AWS) and Snowflake support robust and efficient cloud-based policy management solutions. This marriage of sort of AWS, which has an almost panoply of cloud services, and Snowflake, which is very well known for its data warehousing and analytics capabilities, makes sense because it is an enterprise in which you (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. A Case Study on Transforming Legacy Databases Seamless Migration to Snowflake.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):560-580.
    Migrating legacy database applications to modern cloud-based solutions, such as Snowflake, is becoming essential for organizations aiming to leverage scalable, efficient, and cost-effective data solutions. Legacy databases, typically bound to on-premises infrastructure, often lack the flexibility required by contemporary data analytics and storage needs. Snowflake, a cloud-native data platform, provides a versatile environment that enables efficient data storage, sharing, and processing. This research examines a structured methodology for migrating legacy database applications to Snowflake, addressing key (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  9.  45
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  4
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  45
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  8
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  14.  16
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying every (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  17
    The Great Migration: Understanding the Cloud Revolution in IT.Mittal Mohit - 2024 - International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10 (6):2222-2228.
    This comprehensive article explores the transformative journey of cloud migration in the modern IT landscape, examining its driving forces, benefits, challenges, and critical success factors. The article delves into how organizations across sectors increasingly adopt cloud technologies to enhance operational efficiency, reduce costs, and gain competitive advantages. It highlights the impact on healthcare organizations and discusses the strategic considerations necessary for successful migration. The article examines various aspects of cloud adoption, including financial implications, security concerns, technical challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  20
    Cybersecurity Risk Management in the Era of Remote Work and Cloud Computing.Dhivya K. - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1637-1641.
    The rise of remote work and the widespread adoption of cloud computing have transformed the digital landscape, providing organizations with flexibility and scalability. However, these advancements have also introduced new cybersecurity challenges. Traditional security frameworks, which focus on perimeter defenses, are increasingly inadequate in securing cloud-based environments and remote workforces. This paper explores the evolving landscape of cybersecurity risk management in the context of remote work and cloud computing. It investigates the unique risks associated with these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  51
    Building Scalable Data Warehouses for Financial Analytics in Large Enterprises.Vijayan Naveen Edapurath - 2024 - International Journal of Innovative Research and Creative Technology 10 (3):1-10.
    In today's digital era, large enterprises face the daunting task of managing and analyzing vast volumes of financial data to inform strategic decision-making and maintain a competitive edge. Traditional data warehousing solutions often fall short in addressing the scale, complexity, and performance demands of modern financial analytics. This paper explores the architectural principles, technological strategies, and best practices essential for building scalable data warehouses tailored to the needs of financial analytics in large organizations. It delves into data integration (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  16
    Autonomous Cloud Operations: Self-Optimizing Cloud Systems Powered By AI and Machine Learning.G. Geethanjali - 2013 - International Journal of Innovative Research in Computer and Communication Engineering 13 (3):2138-2143.
    The exponential growth of cloud computing has revolutionized the IT industry by providing scalable, flexible, and cost-efficient infrastructure solutions. However, as cloud systems become more complex, managing and optimizing these environments becomes increasingly challenging. Traditional cloud management methods often require manual intervention and significant resources to maintain performance, cost-efficiency, and security. Autonomous cloud operations, powered by artificial intelligence (AI) and machine learning (ML), represent the next frontier in cloud management. By leveraging advanced algorithms and real-time (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  37
    Digital Transformation in Insurance: How Guidewire, AWS, and Snowflake Converge for Future-Ready Solutions.Adavelli Sateesh Reddy - 2022 - International Journal of Computer Science and Information Technology Research 3 (1):95-114.
    The digital transformation of the insurance industry is unprecedented, urged by the changing expectations of customers, the necessity to embrace regulatory requirements and the necessity to enhance operational efficiency. This paper examines the convergence of three leading-edge technologies, Guidewire, Amazon Web Services (AWS) and Snowflake, to enable scalable, resilient and data-driven solutions for insurers. AWS and Snowflake provide unmatched cloud infrastructure in terms of security and scalability. They also provide industry-specific applications and frameworks for modernizing core systems for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Seamless Migration from Legacy Databases to Snowflake: A Comprehensive Case Study.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):600-610.
    Migrating legacy database applications to modern cloud-based solutions, such as Snowflake, is becoming essential for organizations aiming to leverage scalable, efficient, and cost-effective data solutions. Legacy databases, typically bound to on-premises infrastructure, often lack the flexibility required by contemporary data analytics and storage needs. Snowflake, a cloud-native data platform, provides a versatile environment that enables efficient data storage, sharing, and processing. This research examines a structured methodology for migrating legacy database applications to Snowflake, addressing key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  15
    Future-Proofing Cloud Infrastructures:Analysing the Impact of Azure's Quantum Computing on Enterprise Solutions.Ramteke Rashmi - 2025 - International Journal of Advanced Research in Education and Technology(Ijarety) 12 (1):234-238.
    The rapid advancements in cloud computing are transforming enterprise solutions across industries. Among the most promising innovations is quantum computing, which holds the potential to revolutionize how businesses process data, optimize systems, and solve complex problems. Microsoft Azure, a leader in cloud infrastructure, has integrated quantum computing through Azure Quantum to offer scalable quantum solutions. This paper explores the impact of Azure's quantum computing capabilities on enterprise solutions, focusing on scalability, problem-solving efficiency, and future-proofing business operations. By examining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  11
    Automating Network Security with Ansible: A Guide to Secure Network Automation.Bellamkonda Srikanth - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (9):2722-2730.
    The increasing complexity of modern networks has amplified the challenges associated with ensuring robust and scalable security. With the rapid evolution of cyber threats, traditional methods of network security management are often inadequate, leading to inefficiencies and vulnerabilities. Automation has emerged as a transformative approach to streamline network operations, enhance security postures, and reduce the margin of human error. This study explores the integration of Ansible, a powerful open-source automation tool, into network security workflows to deliver a comprehensive framework for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  17
    Next-Generation Cloud Security Frameworks:Balancing Privacy, Compliance, and Data Protection in a Digital-First Era.Varad Upadhye Atharva Hasabnis - 2025 - International Journal of Advanced Research in Education and Technology (Ijarety) 12 (2):453-457.
    As businesses increasingly migrate to cloud environments, the need for robust and adaptive cloud security frameworks becomes paramount. Cloud services provide numerous benefits such as scalability, flexibility, and cost-efficiency, but they also introduce significant risks in terms of privacy, compliance, and data protection. This paper explores the evolving landscape of cloud security, focusing on next-generation frameworks that aim to balance the often-competing demands of privacy, regulatory compliance, and data protection. We analyze emerging security models that incorporate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  8
    Edge-Cloud Convergence: Architecting Hybrid Systems for Real-Time Data Processing and Latency Optimization.Dutta Shaunot - 2023 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 10 (1):1147-1151.
    With the rapid growth of Internet of Things (IoT) devices and the increasing demand for real-time processing of large data volumes, traditional cloud-based systems struggle to meet latency and bandwidth requirements. Edge-Cloud convergence has emerged as a solution, combining the computational power of cloud data centers with the low-latency and high-throughput capabilities of edge devices. This paper explores the architecture, design principles, and best practices for building hybrid systems that integrate edge computing and cloud infrastructure. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  14
    Optimizing Azure for High-Performance Computing (HPC) in Research and Scientific Applications.Sarode Maitreyan - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (2):582-586.
    : High-performance computing (HPC) plays a crucial role in advancing scientific research and technological innovation by enabling complex simulations, data analysis, and modeling. Azure, Microsoft's cloud computing platform, offers a robust environment for HPC, providing scalable compute power, storage, and advanced tools to accelerate research in fields such as bioinformatics, climate modeling, quantum physics, and engineering. This paper explores how Azure can be optimized for HPC, focusing on the capabilities of Azure’s infrastructure, networking, and services tailored for research and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  16
    Cloud Computing in the Circular Economy:Redefining Resource Efficiency and Waste Reduction for Sustainable Business Practices.Dwivedi Shashi - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):348-352.
    The transition to a Circular Economy (CE) is a critical strategy in addressing global challenges related to resource depletion, waste generation, and environmental sustainability. Cloud computing, as a scalable and data-driven technology, has a significant role to play in enabling the circular economy by enhancing resource efficiency, waste reduction, and the optimization of product lifecycles. This paper explores how cloud computing facilitates circular economy practices by leveraging advanced technologies such as data analytics, Internet of Things (IoT), and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  45
    The Rise of Learning Cloud Technologies: Empowering the Digital Transformation.Akula Arvind Kumar - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (8):14671-14679.
    This comprehensive article explores the convergence of cloud computing and Java technologies, highlighting their synergistic relationship in modern software development. It examines key concepts in cloud computing, including virtualization, microservices architecture, CI/CD practices, and serverless computing. The article also discusses various cloud service models (SaaS, PaaS, and IaaS), their applications, and essential tools and technologies for cloud development. A financial institution's infrastructure modernization case study illustrates the practical implementation of these concepts, demonstrating how cloud technologies (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  31.  49
    Applying Modern Monetary Theory to the Philippines: Achieving Economic Balance Through Natural Laws.Angelito Malicse - manuscript
    Applying Modern Monetary Theory to the Philippines: Achieving Economic Balance Through Natural Laws -/- Introduction -/- The Philippines faces persistent economic challenges, including slow GDP growth, high income inequality, inflationary pressures, and overpopulation. Traditional economic policies often focus on austerity, borrowing limits, and foreign investments, but these approaches fail to address the root causes of economic imbalance. -/- Modern Monetary Theory (MMT) offers an alternative by allowing the government to issue money to finance public spending without relying on foreign debt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  47
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  32
    AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in Data- Driven Transformation.Adavelli Sateesh Reddy - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (6):9069-9080.
    As the integration of Artificial Intelligence (AI) and cloud computing transforms the insurance industry, it is undergoing a major breakthrough. With these technologies, insurers can modernize operations, improve the customer experience and make better decisions using real time data and predictive analytics. This paper aims to explore why AI and cloud play such critical roles in shifting insurance practice from legacy systems modernization, to data governance and regulatory compliance to workforce readiness. Today, world-class AI powered tools and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  5
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  37
    Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support customer engagement. The study offers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  56
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  7
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  43
    The Role of Homomorphic Encryption in Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-265.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption remains (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in (...) storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in (...) storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search improvements and strengthening ABKS against emerging security vulnerabilities are future research priorities. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  92
    A Blueprint for Success: Transforming Legacy Databases with Snowflake Migration Strategies.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):575-585.
    The study outlines the technical challenges encountered during migration, including data compatibility issues, schema conversion, and security compliance, as well as strategies to mitigate these obstacles. Testing and validation techniques are applied throughout the migration, highlighting essential checkpoints to confirm data accuracy and optimal performance in the Snowflake environment. Postmigration performance metrics are evaluated to illustrate improvements in query execution, scalability, and overall system efficiency compared to the legacy system. The results underscore the advantages of Snowflake’s architecture in handling (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  19
    SAP as a Foundation for Enterprise Integration: Connecting Diverse Systems and Data Streams in the Digital Age.Sanjay R. Rakshitha M. - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (2):1642-1645.
    In today's increasingly digital and interconnected business environment, organizations face significant challenges in managing multiple systems, applications, and data streams. SAP plays a central role in integrating these diverse systems and enabling seamless data flow across various platforms. Through solutions like SAP S/4HANA, SAP Cloud Platform, and SAP Integration Suite, businesses can create a unified digital ecosystem that connects onpremise, cloud-based, and third-party applications. These integration capabilities are critical for enhancing operational efficiency, improving decision-making, and fostering (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  15
    Artificial Intelligence and Automation in Cloud Cost Management: Predicting and Optimizing Cloud Spend.Rewatkar Janhavi - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research (Ijmserh) 13 (1):123-128.
    As organizations increasingly adopt cloud computing services, managing and optimizing cloud costs has become a crucial aspect of IT and financial operations. Cloud cost management is a complex and dynamic challenge, given the pay-as-you-go pricing model, the variety of services offered by cloud providers, and the need for scalability and flexibility in cloud environments. Artificial Intelligence (AI) and automation are emerging as key technologies for addressing these challenges. This paper explores the role of AI and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  24
    Cloud-Native Quantum Computing: Unlocking the Potential of Quantum Algorithms on Cloud Infrastructure.Kanchan C. Gaikwad Sakshi R. Hirulkar - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research (Ijmserh) 13 (1):261-264.
    Quantum computing has the potential to revolutionize problem-solving across various domains, from cryptography to materials science. However, the complexities of quantum hardware, including the need for highly specialized environments and significant computational resources, have made quantum computing difficult for most organizations to access. Cloud-native quantum computing, which leverages cloud infrastructure to provide scalable, ondemand access to quantum processors, offers a transformative solution to this challenge. This paper explores the rise of cloud-native quantum computing, focusing on how (...) infrastructure facilitates the deployment and execution of quantum algorithms. We examine the benefits of cloud-based quantum computing, the challenges it faces, and the role of cloud service providers in advancing quantum technologies. Additionally, we explore the synergy between quantum computing and classical computing, emphasizing hybrid quantum-classical systems. Finally, we look ahead to the future of quantum computing in the cloud, outlining emerging trends, research opportunities, and the potential impacts on industries such as finance, healthcare, and logistics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Digital Democracy: Episode IV—A New Hope*: How a Corporation for Public Software Could Transform Digital Engagement for Government and Civil Society.John Gastil & Todd Davies - 2020 - Digital Government: Research and Practice (DGOV) 1 (1):Article No. 6 (15 pages).
    Although successive generations of digital technology have become increasingly powerful in the past 20 years, digital democracy has yet to realize its potential for deliberative transformation. The undemocratic exploitation of massive social media systems continued this trend, but it only worsened an existing problem of modern democracies, which were already struggling to develop deliberative infrastructure independent of digital technologies. There have been many creative conceptions of civic tech, but implementation has lagged behind innovation. This article argues for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  30
    Streamlining HCM Processes with Cloud Architecture.Harish Kumar Reddy Kommera - 2020 - Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11 (2):1323-1338.
    The integration of cloud architecture into Human Capital Management (HCM) systems has revolutionized the way organizations manage their workforce. Cloud-based HCM solutions offer enhanced scalability, flexibility, and accessibility, enabling organizations to streamline HR processes, improve data management, and foster greater employee engagement. This paper explores the impact of cloud architecture on HCM processes, highlighting key benefits such as cost-effectiveness, real-time data access, and seamless integration with other business systems. Through a comprehensive literature review and analysis of case (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  31
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  50.  26
    Sustainable Access Management for Cloud Instances With SSH Securing Cloud Infrastructure With PAM Solutions.Vivekchowdary Attaluri Subash Banala - 2025 - Igi Global Scientific Publishing 1 (1):321-340.
    In the era of cloud computing, securing access to cloud instances is paramount for protecting sensitive data and ensuring compliance with industry standards. Secure Shell (SSH) access management plays a critical role in safeguarding cloud environments by controlling how users interact with cloud-based systems. However, traditional SSH access management methods can often be cumbersome, error-prone, and vulnerable to breaches. This paper explores the implementation of Privileged Access Management (PAM) solutions for enhancing the security of SSH access (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 992