Enhancing Cloud Security: A Comprehensive Framework for Threat Mitigation and Policy Implementation

Authors

  • Dr. M. Mohamed Musthafa, Dr.G.Balaji, Mr.S. Noor Mohammed, Mr.Ashir Sha Backer, Mr. Md Arif Nazam, Mr.R. Ayubkhan., Mr. A. Hussain Fardeen Nasir,

Keywords:

elasticity, ubiquity, scalability, resource availability, Cloud Computing, security.

Abstract

Cloud computing is not a new technology but rather an evolution of IT infrastructure, transitioning from centralized computing to network-dependent distributed systems. It is widely recognized for its pay-per-use model, elasticity, scalability, ubiquity,and resource availability, making it an essential component of modern enterprises. However,security remains a persistent challenge as organizations migrate to cloud-based environments.

References

K. Ashton, “That ‘Internet of Things’ Thing - RFID Journal,” RFiD J., vol. 22, no. 7, pp. 97–114, 2009.

Z. Pang, et al., “Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things,” Enterp. Inf. Syst., vol. 9, no. 1, pp. 86116, 2015.

G. Broil, M. Paolucci, M. Wagner, E. Rukzio, A. Schmidt, and H. Hußmann, “Perci: Pervasive service interaction with the internet of things,” IEEE Internet Comput., vol. 13, no. 6, pp. 74–81, 2009.

Downloads

Published

2024-02-02

How to Cite

Dr. M. Mohamed Musthafa, Dr.G.Balaji, Mr.S. Noor Mohammed, Mr.Ashir Sha Backer, Mr. Md Arif Nazam, Mr.R. Ayubkhan., Mr. A. Hussain Fardeen Nasir,. (2024). Enhancing Cloud Security: A Comprehensive Framework for Threat Mitigation and Policy Implementation. Journal of Computational Analysis and Applications (JoCAAA), 33(2), 1272–1282. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/2242

Issue

Section

Articles

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.