Enhancing Cloud Security: A Comprehensive Framework for Threat Mitigation and Policy Implementation
Keywords:
elasticity, ubiquity, scalability, resource availability, Cloud Computing, security.Abstract
Cloud computing is not a new technology but rather an evolution of IT infrastructure, transitioning from centralized computing to network-dependent distributed systems. It is widely recognized for its pay-per-use model, elasticity, scalability, ubiquity,and resource availability, making it an essential component of modern enterprises. However,security remains a persistent challenge as organizations migrate to cloud-based environments.
References
K. Ashton, “That ‘Internet of Things’ Thing - RFID Journal,” RFiD J., vol. 22, no. 7, pp. 97–114, 2009.
Z. Pang, et al., “Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things,” Enterp. Inf. Syst., vol. 9, no. 1, pp. 86116, 2015.
G. Broil, M. Paolucci, M. Wagner, E. Rukzio, A. Schmidt, and H. Hußmann, “Perci: Pervasive service interaction with the internet of things,” IEEE Internet Comput., vol. 13, no. 6, pp. 74–81, 2009.