Submit Search
Upload
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environments
•
0 likes
•
2 views
IRJET Journal
Follow
https://www.irjet.net/archives/V11/i1/IRJET-V11I133.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
IRJET Journal
Â
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
Â
Ad4502189193
Ad4502189193
IJERA Editor
Â
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
Mubashir Ali
Â
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A Perspective
Cognizant
Â
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
Â
An Analysis of Cloud Security
An Analysis of Cloud Security
IRJET Journal
Â
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Â
Recommended
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
IRJET Journal
Â
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
Â
Ad4502189193
Ad4502189193
IJERA Editor
Â
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
Mubashir Ali
Â
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A Perspective
Cognizant
Â
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
Â
An Analysis of Cloud Security
An Analysis of Cloud Security
IRJET Journal
Â
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Â
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
juliennehar
Â
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
The Economist Media Businesses
Â
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Hitachi Vantara
Â
IRJET- Cloud Computing Adoption and its Impact in India
IRJET- Cloud Computing Adoption and its Impact in India
IRJET Journal
Â
Solutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree
Â
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
Â
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
Â
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IJECEIAES
Â
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
Capgemini
Â
Dynamic network services whitepaper external final
Dynamic network services whitepaper external final
Dean Bonehill â™ Technology for Businessâ™
Â
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
Â
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Â
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
TELKOMNIKA JOURNAL
Â
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
IRJET Journal
Â
B018211016
B018211016
IOSR Journals
Â
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Netmagic Solutions Pvt. Ltd.
Â
How Secure Is Cloud
How Secure Is Cloud
William Lam
Â
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
Â
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
Â
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
Â
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
More Related Content
Similar to Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environments
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
juliennehar
Â
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
The Economist Media Businesses
Â
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Hitachi Vantara
Â
IRJET- Cloud Computing Adoption and its Impact in India
IRJET- Cloud Computing Adoption and its Impact in India
IRJET Journal
Â
Solutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree
Â
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
Â
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
Â
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IJECEIAES
Â
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
Capgemini
Â
Dynamic network services whitepaper external final
Dynamic network services whitepaper external final
Dean Bonehill â™ Technology for Businessâ™
Â
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
Â
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Â
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
TELKOMNIKA JOURNAL
Â
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
IRJET Journal
Â
B018211016
B018211016
IOSR Journals
Â
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Netmagic Solutions Pvt. Ltd.
Â
How Secure Is Cloud
How Secure Is Cloud
William Lam
Â
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
Â
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
Â
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
Â
Similar to Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environments
(20)
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Â
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
Â
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Â
IRJET- Cloud Computing Adoption and its Impact in India
IRJET- Cloud Computing Adoption and its Impact in India
Â
Solutions of cloud computing security issues
Solutions of cloud computing security issues
Â
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Â
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Â
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
Â
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
Â
Dynamic network services whitepaper external final
Dynamic network services whitepaper external final
Â
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
Â
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Â
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
Â
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
Â
B018211016
B018211016
Â
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Â
How Secure Is Cloud
How Secure Is Cloud
Â
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Â
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
Â
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Â
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Â
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Â
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Â
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Â
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Â
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Â
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Â
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Â
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Â
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Â
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Â
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
JoĂŁo Esperancinha
Â
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Â
Recently uploaded
(20)
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Â
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Â
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Â
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Â
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Â
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Â
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Â
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Â
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Â
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Â
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Â
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Â
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Â
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Â
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Â
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environments
1.
© 2024, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 198 Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environments Madhura Yadav M P1, Sanjeev Kulkarni2, 1Research Scholar, Dept. of Computer Science and Information Science, Srinivas University Institute of Engineering & Technology, Mangalore, Karnataka, India 2 Associate Professor, Dept. of Computer Science and Engineering, Srinivas University Institute of Engineering & Technology Mangalore Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The introduction of cloud computing has had a big impact on the rapidly expanding Information Technology (IT) sector. This essay offers a thorough case study that investigates the development of the IT sector and its path towards cloud security. It explores the historical background of IT, highlighting significant turning points in its evolution, and looks at the dynamics influencing the expansion of the sector. The significance of reliable cloud security solutions is becoming more and more clear as enterprises use cloud computing. Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM Cloud, and Microsoft Azure are just a few of the well-known cloud service companies whose tactics are highlighted in this article. Asharedresponsibilityapproachfor cloud security, wherein providers secure the infrastructure and consumers secure their data and applications, is revealed by key results. The study emphasizes the necessity of encryption, role-based access control, multi-factor authentication, and compliance adherence as best practices for cloud security. The IT sector's transition to cloud security is an example of a transformational process that is still reshaping the commercial environment. Organizationsmay implementcloud solutions while maintaining the protection of their data by understanding the advantages and problemsofcloudsecurity. This study adds to the body of knowledgeoncloudsecurityand highlights its crucial role in the expansion of the IT sector while also identifying topics for future study. Key Words: Cloud Computing, Information Technology, Cloud Security, Amazon Web Service, GoogleCloud Platform, IBM Cloud and Microsoft Azure 1. INTRODUCTION Since the beginning, the IT industry has advanced significantly. Businesses used to be in charge of managing and safeguarding their own IT infrastructure as well as investing in their own hardware and software. This was a time-consuming and costly approach that frequently resulted in security vulnerabilities. Businesses can now leverage the computing resources on demand from cloud service providers due to the development of cloud computing. As a result, accessing the necessary IT resources has become much simpler and more economical for businesses. Additional advantages of cloud computing include scalability, cost-effectiveness, and robustness. Cloud computing, however, also presents distinct security issues. Businesses are effectively sharing their data with a third party when they migrate their applications and data to the cloud. They have to, therefore, have faith that the cloud provider can protect their data against security breaches, illegal access, and other online threats. The development of the IT sector and its path to cloud security is a difficult and constantly changing process. However, organizations may make informed decisions regarding whether or not to migrate to the cloud by being aware of the benefits as well as the challenges of cloud security. 2. PURPOSE AND OBJECTIVES This study paper's objective is to provide insights into strategies the IT sector has developed along with the development of cloud computing, with a focus on how to improve cloud security. This article will examine the approaches, challenges, and standard procedures employed by leading cloud service providers and provide information on how they contribute to secure cloud ecosystems using a comprehensive case study technique. The objectives consist of: 1. To properly understand the IT industry's transformational journey anditsgrowthmilestones 2. Identifying the cloud security journey along with the IT industry 3. Identifying the main security issues that businesses with cloud deployments encounter 4. Knowing the steps businesses can take to protect their data in the cloud 5. Comparing the approaches and best practices used by recognized cloud service providers to deal with security issues and uphold confidence in cloud systems 6. Knowing the security best practices for the cloud International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 199 3. METHODOLOGY The data needed forthis casestudyhasbeencollectedusinga variety of secondary sources, including IT industry websites, journals, published papers, archival newspaper articles, and published papers. The case study will give an illustration of how a business utilized cloud security. 4. THE GROWTH OF IT INDUSTRY IN CLOUD [1,2] The 1990s: The emergenceofkeytechnologiesliketheWorld Wide Web and virtualization characterized the initial stages of cloud computing. These innovations prepared the way for the eventual revolution in cloud computing. The 2000s: Featured the introduction of the firstcommercial cloud computing services. These services wereprovidedbya limited number of companies, and enterprises and government organizations preferred to employ them. The 2010s: During this period of time, the market for cloud computing has rapidly increased. Due to the introduction of various new cloud providers, cloud computing services have becomemoreaccessibleandcost-effectivetoorganizationsof any size. The 2020s: The market for cloud computing is continue expanding significantly in the 2020s. For many companies and government organizations, the cloud has emerged asthe preferred method of delivering IT services. There are a variety of causes that have fueled the rise of the IT sector in the cloud, including [3]: • The growing need for elastic and scalable IT resources. • The reduction in cloud computing costs. • The cloud computing services' improving standards of reliability and security. • The increasing in demand of mobile and software that is cloud-based. A significant development that is changing the way businesses and governmental organizations provide IT services are the expansion of the cloud-based IT industry. Businesses are benefiting from cloud computing in a variety of ways, including [4]: • Minimize IT expenses. • Enhanced scalability and agility. • Enhanced dependability and security. • Having access to the newest IT developments. It is expected that even more organizations are going to employ cloud computing services as the market for it improves. The delivery of IT is moving toward cloud computing, which is changing how firms conduct their operations. 5. IT INDUSTRY AND CLOUD SECURITY [1, 5]: 1990s: The emergence of key technologies like the World Wide Web and virtualization characterizedthe earlyyears of cloud computing. These advancements established an environment for the ultimate revolutionincloudcomputing. However, in the 1990s, cloud security wasnotconsidered an important concern. Businesses were more concerned with protecting their data locally and did not perceive the cloud as being an essential security issue. 2000s: At the beginning ofthisdecade,theinitial commercial cloud computing services came into existence. These services were provided by a limited number of organizations, enterprises and government departments preferred to employ them. Security issues started to appear as cloud computing developed popularity. Businesses expressed concern about the security of their cloud-based data and wanted to know how cloud service providers were securing it. 2010s: In the 2010s, the market for cloud computing grew drastically. Due to the entry of several new cloud providers, cloud computing services have become more accessible and cost-effective for organizations of any size. Security issues were becoming increasingly common as cloud computing gained widespread adoption. Businesses asked that cloud service providers enhance security as they became more aware of the dangers associated with storing their data in the cloud. 2020s: The market for cloud computing is continuing expanding significantly in the 2020s. For many businesses and governmental organizations, the cloud has emerged as the preferred method for providing IT services. Businesses are now very concerned about cloud security. Businesses still need to take precautions to protect their data in the cloud even if cloud providers have put in place a number of security guarantees to secure their infrastructurealong with the data they store. The following constitute some of the major security issues that business entities employing the cloud have to deal with [6]: • Data breaches: Since the beginning of the century, there have occurred several instances of high- profile data breaches. Cloud companies are frequently targeted by hackers. • Malware: Phishing emails, infectedwebsites,aswell as malicious code are among the most common of the ways that malware could be introduced into the cloud. • DDoS assaults: By saturating cloud services with traffic, DDoS attacks may be employed to disrupt them.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 200 • Account takeover: Employing hacked passwords or other login information, hackerscantakeovercloud accounts. In order to protect their data on the cloud, organizations are able to employ a number of preventative measures, including [7]: • Using strong passwords: Organizations should frequently change the passwords on all of their cloud accounts. • Enabling multi-factor authentication: Byprompting users to provide a code through their mobile device in addition to their password, multi-factor authentication offers an additional level of security to cloud accounts. • Updating software: Organizations should updateall software used in their cloud environment in order to fix security flaws. • Educating employees: Companies should educate staff on the dangers of cloud security and how to safeguard their data. Businesses may take advantageofthecloud,butit'sessential to be conscious of the security concerns. Businesses can decrease the potential risks of cloud computing along with guarantee the security of their data by taking measures to protect it. Organizations additionally require making themselves prepared for the subsequent cloud security concerns [8] as an additional to the security issues previously highlighted. • The expansion of hybrid and multi-cloud settings: As more companiesembrace hybridandmulti-cloud environments,securityacrossmanycloudproviders will need to be managed. • Artificial intelligence (AI) and machine learning (ML) are being employed moreandmore.AIandML have been implemented to automate security processes and detect risks more quickly. • The expanding significance of data privacy and compliance: Organizations will have to abide by a growing variety of data privacy and compliance standards, which will have a significant effect on cloud security. Security in the cloud has a promising future. Improved security protocols will be created to protectdata inthecloud as the industry develops faster. Businesses that employ cloud computing have to remain updated on security advances and take measures for protecting their data. 6. A COMPARISON OF GOOGLE CLOUD PLATFORM (GCP), IBM CLOUD, AMAZONWEBSERVICES(AWS), AND MICROSOFT AZURE'S CLOUD SECURITY BEST PRACTICES AND STRATEGIES Leading cloud providers including Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM Cloud, and Microsoft Azure have all created thorough policies and best practices to address this crucial issue. Cloud security is a top worry for enterprises moving to the cloud. The significant parallels and divergences between respective techniques to cloud security are shown in this comparison. 6.1 Shared Responsibility Model [9, 10]: AWS: AWS places a strong emphasis on the shared responsibility model, outlining exactly how its clients and it divide up the burden for security. Customersareinchargeof protecting their data and applications, while AWS is in charge of protecting the underlying infrastructure. GCP: Google Cloud similarly complies to the concept of shared responsibility, with customers responsible for the security of their data and workloads and Google taking care of infrastructure security. IBM Cloud: IBM Cloud follows an identical shared responsibility approach in which customers are in charge of protecting their data and applications while IBMsecuresthe infrastructure. Azure: Microsoft Azure has a shared responsibility approach, with customers responsible for the security of their data and services and Microsoft responsible for protecting the underlying infrastructure. 6.2 Identity and AccessManagement (IAM) [11, 12, 13, 14]: AWS: IAM services from AWS are available for strong authentication and access control, enabling users to successfully manage user identities, roles, and permissions. GCP: Organizations are able to apply sophisticated access controls based on contextual factorsbecauseofGoogleCloud Identity and Context-Aware Access, which offers sophisticated IAM capabilities. IBM Cloud: To control user access, roles, and permissions within its cloud environment, IBM Cloud integrates IAM technologies. Azure: Azure provides complete management of identities and role-based access control features with Azure Active Directory (Azure AD).
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 201 6.3 Encryption Mechanisms [15, 16, 17]: AWS: AWS offers strong encryptiontoolsforprotectingdata, such as the AWS Key Management Service (KMS) for controlling encryption keys. GCP: Strong encryption mechanisms are available through Google Cloud, and key management functions are offered by Google Cloud KeyManagement Service (KMS). IBM Cloud: For the purpose of protecting data while it is in transit and at rest, IBM Cloud offers encryption tools like IBM Key Protect. Azure: Microsoft Azure has strong encryptionfeatures,such as Azure Key Vault for safe key management. 6.4 Security Audits and Compliance [18]: AWS: AWS helps consumers ensure their cloud environments follow with industry and government standards by facilitating routine security audits, examinations of vulnerabilities, and compliance assessments. GCP: Google Cloud helps businesses comply with legal obligations byconductingsecurityevaluationsandproviding compliance certifications. IBM Cloud: To assist businesses in maintaining a legally compliant cloud infrastructure, IBMCloudofferscompliance evaluations and regulatory standards. Azure: In order to receive compliance certifications, Microsoft Azure is subjected to stringent audits. Azure also helps clients comply with legal obligations. 6.5 Best Practices and Recommendations [19]: AWS: AWS offers a multitude of best practice information, such as the Well-Architected Framework, to assist clients in creating reliable, effective, and secure infrastructures. GCP: Google Cloud provides thorough instructions and recommended procedures for protecting cloud resources and enhancing security settings. IBM Cloud: To help businesses put effective security measures in place, IBM Cloud provides security best practices and guidelines. Azure: Microsoft Azure provides the Azure Security Center, that provides recommendations for best practices, security evaluations, and threat detection tools. 6.6 Unique Offerings [20, 21]: AWS: AWS provides services including AWS GuardDuty for vulnerability detection, AWS CloudTrail for auditing, and AWS Identity and Access Management (IAM). GCP: Google CloudoffersBeyondCorpforzero-trustsecurity, Google Cloud IdentityandContext-AwareAccess,andGoogle Cloud Security Command Center. IBM Cloud: IBM Cloud offers IBM Key Protect in addition to Hyper Protect servicesforhigh-techencryptionandsecurity. Azure: Microsoft Azure's Azure Security Center, Azure Information Protection, and Azure Active Directory are all used for threat detection and management, data classification, and identity management, respectively. 7. BEST PRACTICES FOR CLOUD SECURITY 7.1 Unique Regular Security Audits and Assessments [22]: The key to establishing an appropriatelevel ofsecurityin the cloud is to periodically carry out security audits and assessments. It's necessary to regularly check your cloud infrastructure for securitypolicycompliance,vulnerabilities, and inappropriate configurations.Amongthetoptechniques in this field are: • Vulnerability Scanning: Automated vulnerability scanning tools should be used to identify and correct any security vulnerabilities in your cloud infrastructure. • Penetration Testing: Perform penetration tests in order to imitate actual attacks and identify weaknesses before attackers do. • Continuous Monitoring: Establish constant surveillance of security to identify risks efficiently and take appropriate action. • Compliance audits: To ensure adherence, regularly check your cloud infrastructure against regulatory and industry-specific compliance standards. • Security Posture Assessment: Regularly evaluate your cloud security posture and make changes in response to evolving threat environments and organizational requirements. 7.2 Multi-Factor Authentication (MFA) [23]: Before being allowed access to cloud resources, consumers must first give different types of identity, which is known as multi-factor authentication (MFA). Implementing MFA best practices include: • Enforce MFA: All users should be subject to MFA requirements, particularly for access to sensitive information and administrative tasks. • Biometric Authentication: Incorporate the use of biometric identification, suchasfacial orfingerprint recognition, for increased security. • Time-BasedOne-TimePasswords(TOTP):Makeuse of hardware tokens or TOTP applications to create time-sensitive credentials for authentication.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 202 • Single Sign-On (SSO) Integration: Integrate MFA with single sign-on (SSO) solutions for streamlined, secure access to numerous applications. 7.3 Encryption Mechanisms for Data Protection [24]: The most important aspect of cloud security is data encryption. It helps to make sure that data is protected even in the event of illegal access. Data encryption best practices include: • End-to-End Encryption: Incorporate end-to-end encryption for protecting data while it is in transit and at rest. • Key management:Tosafeguard encryptionkeysand make sure their correct lifecycle management, use secure key management solutions. • Data Masking: Secure confidential information in non-production environments by using data masking techniques. • Tokenization: Implementing tokenization will reduce your risk in the event of a breach by replacing sensitive data with tokens. 7.4 Role-Based Access Control (RBAC) [25]: The management of access permissions in the cloud can be done at a granular level using role-based access control (RBAC). RBAC best practices include: • Least Privilege Principle: It states that each user or role should only have a limited number of authority and permissions. • Regular Review: Frequently examine and modify authorizations in accordance with modifications to job roles and responsibilities. • Role Hierarchy: Establishing a clear position hierarchy will provide effectiveaccesscontrol while keeping things simple. • Audit Trails: Activate audit trails to keep track of modifications to roles and permissions for transparency. 7.5 Compliance Adherence and Regulatory Standards [26]: For several organizations, adherence towards compliance and regulatory standards is mandatory. Among the best practices in this field of study are: • Compliance Framework: Create a thorough compliance framework that complieswithlocal and sector-specific legal standards. • Regular Evaluations:Performroutine evaluationsto verify continuous compliance and to quickly address any non-compliance issues. • Documentation and Reporting: Keep thorough records of your compliance activities for inspection purposes. • Training and Awareness: To promote a culture of compliance, educate staff members on legal obligations and best practices. 8. CONCLUSIONS Cloud computing has revolutionized innovation and efficiency in a world characterized bydigital transformation. The essential significance of cloud security cannot be emphasized as businesses employ the cloud more and more to improve their operations. This conclusion section summarizes major conclusions from the analysis of cloud security, emphasizes the role of cloud security in the growing scope of IT, examines over possible future consequences, and proposes areas for additional research. 8.1 Recap of Key Findings: A comprehensive investigation on cloudsecurityhasyielded the following significant conclusions: • Shared Responsibility Model: In a shared responsibility model, both cloud service providers and their clients are responsible for security. This paradigm places a strong emphasis on the value of cooperation and an appreciation of individual roles. • Strategies and Best Practices: Prominent cloud service providers have outlined extensive security strategies and best practices, including Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM Cloud, and Microsoft Azure. These include proactive security measures, encryption, compliance adherence, and identity and access management. • Challenges inCloudSecurity: Data breaches,worries about regulatory compliance, and the necessity for efficient monitoring and auditingtoolsarejusta few of the difficulties that the changing cloud security landscape provides. • Security Audits and Assessments: To maintain a strong security posture in the cloud, regular inspections of security, assessments of vulnerabilities and compliance audits are crucial. • Multi-Factor Authentication and Encryption: MFA and encryption measuresmustbeemployedin order to secure access to and the storage of data in the cloud. • Role-Based Access Control (RBAC):Byensuringthat access permissions are issued in accordance with the concept of least privilege, role-based access control (RBAC) helps to reduce security risks. • Standards for regulatory compliance: For enterprises using the cloud, compliance with regional and industry-specific regulatory norms is essential.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 203 8.2 Significance of Cloud Security in IT Growth: It is impossible to underestimate the importance of cloud security in the expansion of the IT industry. The agility, scalability, and cost-effectiveness that businesses need to succeed in the digital age are supported by cloudcomputing. Strong cloud security not only protects sensitive data but also promotes user and customer confidence. It enables IT growth on a global scale by empowering organizations to innovate without compromising security. IRJET sample template format ,Conclusion content comes here. Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here . Conclusion content comes here REFERENCES [1] Kushida, K. E., Murray, J., &Zysman, J. (2015). Cloud computing: From scarcity to abundance. Journal of Industry, Competition and Trade, 15, 5-19. [2] “A Brief History of Cloud Computing”, https://www.dataversity.net/brief-history-cloud- computing/ [3] Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534. [4] Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., &Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision support systems, 51(1), 176-189. [5] “The most important cloud advances of the decade”, https://www.techrepublic.com/article/the-most- important-cloud-advances-of-the-decade/ [6] Kolevski, D., Michael, K., Abas, R., & Freeman, M. (2022, November). Cloud computing data breaches in news media: Disclosure of personal and sensitive data. In 2022 IEEE International Symposium on Technology and Society (ISTAS) (Vol. 1, pp. 1-11). IEEE. [7] “https://aws.amazon.com/what-is/mfa/”, https://aws.amazon.com/what-is/mfa/. [8] Hong, J., Dreibholz, T., Schenkel, J. A., & Hu, J. A. (2019). An overview of multi-cloudcomputing.In Web,Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019) 33 (pp. 1055-1068). Springer International Publishing. [9] Torkura, K. A., Sukmana, M. I., Cheng, F., &Meinel, C. (2021). Continuous auditing and threat detection in multi-cloud infrastructure. Computers & Security, 102, 102124. [10] Boneder, S. (2023). Evaluation and comparison of the security offerings of the big three cloud service providers Amazon Web Services, Microsoft Azure and Google Cloud Platform (Doctoral dissertation, TechnischeHochschule Ingolstadt). [11] “IAM overview”, https://cloud.google.com/iam/docs/overview [12] “Overview of AWS identity management:”, https://docs.aws.amazon.com/IAM/latest/UserGuide/i ntroduction_identity-management.html. [13] “Security Control: Identity management”, https://learn.microsoft.com/en- us/security/benchmark/azure/mcsb-identity- management [14] “IBM Security Verify: IAM solutions”, https://www.ibm.com/verify?utm_content=SRCWW&p 1=Search&p4=43700068116305118&p5=p&gclid=CjwK CAjwo9unBhBTEiwAipC116h9gzYxI7RNJ8rkcI1jPMtJcd 8lKSWzMCKK9xuMhUqXPvquMnLDchoCb6UQAvD_BwE &gclsrc=aw.ds [15] “Cloud Key Management”, https://cloud.google.com /security-key-management [16] “AWS Key Management Service”, https://aws.amazon.com/kms/ [17] Dasher, G., Envid, I., & Calder, B. (2022). Architectures for Protecting Cloud Data Planes. arXiv preprint arXiv:2201.13010. [18] Kumar, R., &Goyal, R. (2019). Assurance of data security and privacy in the cloud: A three-dimensional perspective. Software Quality Professional, 21(2),7-26. [19] Gleb, T., &Gleb, T. (2021). Systematic Cloud Migration. Apress. “Compare AWS and Azure services to Google Cloud”, https://cloud.google.com/docs/get- started/aws-azure-gcp-service-comparison [20] “IBM Storage Protect for Cloud”, https://www.ibm.com/products/storage-protect-for- cloud?utm_content=SRCWW&p1=Search&p4=4370007 6608394579&p5=p&gclid=CjwKCAjwo9unBhBTEiwAip C11-
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 204 3sMjSUOBGOv3Mmog3AKvzBnxXwLdwYHr7CuI0D7Vrs MaDLBsFNfRoChckQAvD_BwE&gclsrc=aw.ds [21] Muralidhara, P. (2017). THE EVOLUTION OF CLOUD COMPUTING SECURITY: ADDRESSING EMERGING THREATS. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 1(4), 1-33. [22] “What is Multi-Factor Authentication”, https://intellipaat.com/blog/multi-factor- authentication/ [23] Xiaohui, X. (2013, June). Study on securityproblemsand key technologies of the internet of things. In 2013 International conference on computational and information sciences (pp. 407-410). IEEE. [24] Lopez, J., & Rubio, J. E. (2018). Access control for cyber- physical systems interconnected tothecloud. Computer Networks, 134, 46-54. [25] Bieger, V. (2023). A decision support framework for multi-cloud service composition (Master's thesis).
Download now