Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environment

Page 1

International

Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072

Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to Secure Cloud Environments

Madhura Yadav M P1 , Sanjeev

1Research Scholar, Dept. of Computer Science and Information Science, Srinivas University Institute of Engineering & Technology, Mangalore, Karnataka, India

2 Associate Professor, Dept. of Computer Science and Engineering, Srinivas University Institute of Engineering & Technology Mangalore Karnataka, India

Abstract - The introduction of cloud computing has had a big impact on the rapidly expanding Information Technology (IT) sector. This essay offers a thorough case study that investigates the development of the IT sector and its path towards cloud security. It explores the historical background of IT, highlighting significant turning points in its evolution, and looks at the dynamics influencing the expansion of the sector. The significance of reliable cloud security solutions is becoming more and more clear as enterprises use cloud computing. Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM Cloud, and Microsoft Azure are just a few of the well-known cloud service companies whose tactics are highlighted in this article.Asharedresponsibilityapproachfor cloud security, wherein providers secure the infrastructure and consumers secure their data and applications, is revealed by key results.

The study emphasizes the necessity of encryption, role-based access control, multi-factor authentication, and compliance adherence as best practices for cloud security. The IT sector's transition to cloud security is an example of a transformational process that is still reshaping the commercial environment.Organizationsmayimplementcloud solutions while maintaining the protection of their data by understanding the advantages and problemsofcloudsecurity. This study adds to the body of knowledgeoncloudsecurityand highlights its crucial role in the expansion of the IT sector while also identifying topics for future study.

Key Words: Cloud Computing, Information Technology, Cloud Security, Amazon Web Service, GoogleCloud Platform, IBM Cloud and Microsoft Azure

1. INTRODUCTION

Sincethebeginning,theITindustryhasadvanced significantly.Businessesusedtobeinchargeofmanaging and safeguarding their own IT infrastructure as well as investing intheirownhardware andsoftware. Thiswasa time-consuming and costly approach that frequently resulted in security vulnerabilities. Businesses can now leverage the computing resources on demand from cloud service providers due to the development of cloud computing.Asaresult,accessingthenecessaryITresources has become much simpler and more economical for

businesses. Additional advantages of cloud computing includescalability,cost-effectiveness,androbustness.

Cloud computing, however, also presents distinct securityissues.Businessesareeffectivelysharingtheirdata withathirdpartywhentheymigratetheirapplicationsand datatothecloud.Theyhaveto,therefore,havefaiththatthe cloud provider can protect their data against security breaches, illegal access, and other online threats. The developmentoftheITsectoranditspathtocloudsecurityis a difficult and constantly changing process. However, organizations may make informed decisions regarding whetherornottomigratetothecloudbybeingawareofthe benefitsaswellasthechallengesofcloudsecurity.

2. PURPOSE AND OBJECTIVES

Thisstudypaper'sobjectiveistoprovideinsights into strategies the IT sector has developed along with the development of cloud computing, with a focus on how to improve cloud security. This article will examine the approaches,challenges,andstandardproceduresemployed byleadingcloudserviceprovidersandprovideinformation onhowtheycontributetosecurecloudecosystemsusinga comprehensivecasestudytechnique.

Theobjectivesconsistof:

1. To properly understand the IT industry's transformationaljourneyanditsgrowthmilestones

2. Identifying the cloud security journey along with theITindustry

3. Identifyingthemainsecurityissuesthatbusinesses withclouddeploymentsencounter

4. Knowing the steps businesses can take to protect theirdatainthecloud

5. Comparingtheapproachesandbestpracticesused byrecognizedcloudserviceproviderstodealwith security issues and uphold confidence in cloud systems

6. Knowingthesecuritybestpracticesforthecloud

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page198
***
Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

3. METHODOLOGY

Thedataneededforthiscasestudyhasbeencollectedusinga varietyofsecondarysources,includingITindustrywebsites, journals,publishedpapers,archivalnewspaperarticles,and publishedpapers.Thecasestudywillgiveanillustrationof howabusinessutilizedcloudsecurity.

4 THE GROWTH OF IT INDUSTRY IN CLOUD [1,2]

The1990s:TheemergenceofkeytechnologiesliketheWorld WideWebandvirtualizationcharacterizedtheinitialstages ofcloudcomputing.Theseinnovationspreparedthewayfor theeventualrevolutionincloudcomputing.

The2000s:Featuredtheintroductionofthefirstcommercial cloudcomputingservices.Theseserviceswereprovidedbya limited number of companies, and enterprises and governmentorganizationspreferredtoemploythem.

The2010s:Duringthisperiodoftime,themarketforcloud computinghasrapidlyincreased.Duetotheintroductionof variousnewcloudproviders,cloudcomputingserviceshave becomemoreaccessibleandcost-effectivetoorganizationsof anysize.

The 2020s: The market for cloud computing is continue expanding significantly in the 2020s.For many companies andgovernmentorganizations,thecloudhasemergedasthe preferredmethodofdeliveringITservices.

Thereareavarietyofcausesthathavefueledtheriseofthe ITsectorinthecloud,including[3]:

• The growing need for elastic and scalable IT resources.

• Thereductionincloudcomputingcosts.

• Thecloudcomputingservices'improvingstandards ofreliabilityandsecurity.

• The increasing in demand of mobile and software thatiscloud-based.

A significant development that is changing the way businesses and governmental organizations provide IT services are the expansion of the cloud-based IT industry. Businessesarebenefitingfromcloudcomputinginavariety ofways,including[4]:

• MinimizeITexpenses.

• Enhancedscalabilityandagility.

• Enhanceddependabilityandsecurity.

• HavingaccesstothenewestITdevelopments.

It is expected that even more organizations are going to employ cloud computing services as the market for it improves. The delivery of IT is moving toward cloud computing, which is changing how firms conduct their operations.

5. IT INDUSTRY AND CLOUD SECURITY [1, 5]:

1990s: The emergence of key technologies like the World WideWebandvirtualizationcharacterizedtheearlyyearsof cloud computing. These advancements established an environmentfortheultimaterevolutionincloudcomputing. However,inthe1990s,cloudsecuritywasnotconsideredan importantconcern.Businessesweremoreconcernedwith protectingtheirdatalocallyanddidnotperceivethecloud asbeinganessentialsecurityissue.

2000s:Atthebeginningofthisdecade,theinitialcommercial cloud computing services came into existence. These services were provided by a limited number of organizations, enterprises and government departments preferredtoemploythem.Securityissuesstartedtoappear as cloud computing developed popularity. Businesses expressedconcernaboutthesecurityoftheircloud-based dataandwantedtoknowhowcloudserviceproviderswere securingit.

2010s:Inthe2010s,themarketforcloudcomputinggrew drastically.Duetotheentryofseveralnewcloudproviders, cloudcomputingserviceshavebecomemoreaccessibleand cost-effectivefororganizationsofanysize.Securityissues were becoming increasingly common as cloud computing gained widespread adoption. Businesses asked that cloud service providers enhance security as they became more awareofthedangersassociatedwithstoringtheirdata in thecloud.

2020s: The market for cloud computing is continuing expandingsignificantlyinthe2020s.Formanybusinesses andgovernmentalorganizations,thecloudhasemergedas thepreferredmethodforprovidingITservices.Businesses are now very concerned about cloud security. Businesses still need to take precautions to protect their data in the cloudevenifcloudprovidershaveputinplaceanumberof securityguaranteestosecuretheirinfrastructurealongwith thedatatheystore.

Thefollowingconstitutesomeofthemajorsecurityissues thatbusinessentitiesemployingthecloudhavetodealwith [6]:

• Databreaches:Sincethebeginningofthecentury, there have occurred several instances of highprofile data breaches. Cloud companies are frequentlytargetedbyhackers.

• Malware:Phishingemails,infectedwebsites,aswell asmaliciouscodeareamongthemostcommonof thewaysthatmalwarecouldbeintroducedintothe cloud.

• DDoS assaults: By saturating cloud services with traffic, DDoS attacks may be employed to disrupt them.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page199

• Accounttakeover:Employinghackedpasswordsor otherlogininformation,hackerscantakeovercloud accounts.

Inordertoprotecttheirdataonthecloud,organizationsare able to employ a number of preventative measures, including[7]:

• Using strong passwords: Organizations should frequently change the passwords on all of their cloudaccounts.

• Enablingmulti-factorauthentication:Byprompting userstoprovideacodethroughtheirmobiledevice in addition to their password, multi-factor authenticationoffersanadditionallevelofsecurity tocloudaccounts.

• Updatingsoftware:Organizationsshouldupdateall softwareusedintheircloudenvironmentinorder tofixsecurityflaws.

• Educating employees: Companies should educate staff on the dangers of cloud security and how to safeguardtheirdata.

Businessesmaytakeadvantageofthecloud,butit'sessential to be conscious of the security concerns. Businesses can decreasethepotentialrisksofcloudcomputingalongwith guaranteethesecurityoftheirdatabytakingmeasuresto protectit.

Organizations additionally require making themselves preparedforthesubsequentcloudsecurityconcerns[8]as anadditionaltothesecurityissuespreviouslyhighlighted.

• Theexpansionofhybridandmulti-cloudsettings: Asmorecompaniesembracehybridandmulti-cloud environments,securityacrossmanycloudproviders willneedtobemanaged.

• Artificial intelligence (AI) and machine learning (ML)arebeingemployedmoreandmore.AIandML have been implemented to automate security processesanddetectrisksmorequickly.

• The expanding significance of data privacy and compliance: Organizations will havetoabide bya growing variety of data privacy and compliance standards, which will have a significant effect on cloudsecurity.

Security in the cloud has a promising future. Improved securityprotocolswillbecreatedtoprotectdatainthecloud as the industry develops faster. Businesses that employ cloud computing have to remain updated on security advancesandtakemeasuresforprotectingtheirdata.

6. A COMPARISON OF GOOGLE CLOUD PLATFORM (GCP), IBM CLOUD, AMAZONWEB SERVICES (AWS), AND MICROSOFT AZURE'S CLOUD SECURITY BEST PRACTICES AND STRATEGIES

Leading cloud providers including Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM Cloud, and MicrosoftAzurehaveallcreatedthoroughpoliciesandbest practicestoaddressthiscrucialissue.Cloudsecurityisatop worryforenterprisesmovingtothecloud.Thesignificant parallelsanddivergencesbetweenrespectivetechniquesto cloudsecurityareshowninthiscomparison.

6.1 Shared Responsibility Model [9, 10]:

AWS: AWS places a strong emphasis on the shared responsibilitymodel,outliningexactlyhowitsclientsandit divideuptheburdenforsecurity.Customersareinchargeof protecting their data and applications, while AWS is in chargeofprotectingtheunderlyinginfrastructure.

GCP: Google Cloud similarly complies to the concept of shared responsibility, with customers responsible for the securityoftheirdataandworkloadsandGoogletakingcare ofinfrastructuresecurity.

IBM Cloud: IBM Cloud follows an identical shared responsibilityapproachinwhichcustomersareinchargeof protectingtheirdataandapplicationswhileIBMsecuresthe infrastructure.

Azure: Microsoft Azure has a shared responsibility approach, with customers responsible for the security of their data and services and Microsoft responsible for protectingtheunderlyinginfrastructure.

6.2 Identity and Access Management (IAM) [11, 12, 13, 14]:

AWS: IAM services from AWS are available for strong authentication and access control, enabling users to successfullymanageuseridentities,roles,andpermissions.

GCP: Organizations are able to apply sophisticated access controlsbasedoncontextualfactorsbecauseofGoogleCloud Identity and Context-Aware Access, which offers sophisticatedIAMcapabilities.

IBM Cloud:Tocontroluseraccess,roles,andpermissions within its cloud environment, IBM Cloud integrates IAM technologies.

Azure:Azureprovidescompletemanagementofidentities and role-based access control features with Azure Active Directory(AzureAD).

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page200

6.3 Encryption Mechanisms [15, 16, 17]:

AWS:AWSoffersstrongencryptiontoolsforprotectingdata, such as the AWS Key Management Service (KMS) for controllingencryptionkeys.

GCP:Strongencryptionmechanismsareavailablethrough GoogleCloud,andkeymanagementfunctionsareofferedby GoogleCloudKeyManagementService(KMS).

IBM Cloud:Forthepurposeofprotectingdatawhileitisin transit and at rest, IBM Cloud offers encryption tools like IBMKeyProtect.

Azure:MicrosoftAzurehasstrongencryptionfeatures,such asAzureKeyVaultforsafekeymanagement.

6.4 Security Audits and Compliance [18]:

AWS: AWS helps consumers ensure their cloud environments follow with industry and government standards by facilitating routine security audits, examinations of vulnerabilities, and compliance assessments.

GCP: Google Cloud helps businesses comply with legal obligationsbyconductingsecurityevaluationsandproviding compliancecertifications.

IBM Cloud: To assist businesses in maintaining a legally compliantcloudinfrastructure,IBMCloudofferscompliance evaluationsandregulatorystandards.

Azure: In order to receive compliance certifications, MicrosoftAzureissubjectedtostringentaudits.Azurealso helpsclientscomplywithlegalobligations.

6.5 Best Practices and

Recommendations [19]:

AWS:AWSoffersamultitudeofbestpracticeinformation, suchastheWell-ArchitectedFramework,toassistclientsin creatingreliable,effective,andsecureinfrastructures.

GCP: Google Cloud provides thorough instructions and recommended procedures for protecting cloud resources andenhancingsecuritysettings.

IBM Cloud: To help businesses put effective security measures in place, IBM Cloud provides security best practicesandguidelines.

Azure:MicrosoftAzureprovidestheAzureSecurityCenter, thatprovidesrecommendationsforbestpractices,security evaluations,andthreatdetectiontools.

6.6 Unique Offerings [20, 21]:

AWS:AWSprovidesservicesincludingAWSGuardDutyfor vulnerability detection, AWS CloudTrail for auditing, and AWSIdentityandAccessManagement(IAM)

GCP:GoogleCloudoffersBeyondCorpforzero-trustsecurity, GoogleCloudIdentityandContext-AwareAccess,andGoogle CloudSecurityCommandCenter.

IBM Cloud:IBMCloudoffersIBMKeyProtectinadditionto HyperProtectservicesforhigh-techencryptionandsecurity.

Azure: Microsoft Azure's Azure Security Center, Azure InformationProtection,andAzureActiveDirectoryareall used for threat detection and management, data classification,andidentitymanagement,respectively.

7. BEST PRACTICES FOR CLOUD SECURITY

7.1 Unique Regular Security Audits and Assessments [22]:

Thekeytoestablishinganappropriatelevelofsecurityinthe cloud is to periodically carry out security audits and assessments. It's necessary to regularly check your cloud infrastructureforsecuritypolicycompliance,vulnerabilities, andinappropriateconfigurations.Amongthetoptechniques inthisfieldare:

• Vulnerability Scanning: Automated vulnerability scanning tools should be used to identify and correct any security vulnerabilities in your cloud infrastructure.

• Penetration Testing: Perform penetration tests in order to imitate actual attacks and identify weaknessesbeforeattackersdo.

• Continuous Monitoring: Establish constant surveillanceofsecuritytoidentifyrisksefficiently andtakeappropriateaction.

• Complianceaudits:Toensureadherence,regularly checkyourcloudinfrastructureagainstregulatory andindustry-specificcompliancestandards.

• Security Posture Assessment: Regularly evaluate your cloud security posture and make changes in response to evolving threat environments and organizationalrequirements.

7.2 Multi-Factor Authentication (MFA) [23]:

Beforebeingallowedaccesstocloudresources,consumers mustfirstgivedifferenttypesofidentity,whichisknownas multi-factorauthentication(MFA).ImplementingMFAbest practicesinclude:

• Enforce MFA: All users should be subject to MFA requirements, particularly for access to sensitive informationandadministrativetasks.

• Biometric Authentication: Incorporate the use of biometricidentification,suchasfacialorfingerprint recognition,forincreasedsecurity.

• Time-BasedOne-TimePasswords(TOTP):Makeuse ofhardwaretokensorTOTPapplicationstocreate time-sensitivecredentialsforauthentication.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page201

• Single Sign-On (SSO) Integration: Integrate MFA withsinglesign-on(SSO)solutionsforstreamlined, secureaccesstonumerousapplications.

7.3 Encryption Mechanisms for Data Protection [24]:

The most important aspect of cloud security is data encryption.Ithelpstomakesurethatdataisprotectedeven intheeventofillegalaccess.Dataencryptionbestpractices include:

• End-to-End Encryption: Incorporate end-to-end encryptionforprotectingdatawhileitisintransit andatrest.

• Keymanagement:Tosafeguardencryptionkeysand makesuretheircorrectlifecyclemanagement,use securekeymanagementsolutions.

• Data Masking: Secure confidential information in non-production environments by using data maskingtechniques.

• Tokenization: Implementing tokenization will reduce your risk in the event of a breach by replacingsensitivedatawithtokens.

7.4 Role-Based Access Control (RBAC) [25]:

Themanagementofaccesspermissionsinthecloudcanbe done at a granular level using role-based access control (RBAC).RBACbestpracticesinclude:

• LeastPrivilegePrinciple:Itstatesthateachuseror roleshouldonlyhavealimitednumberofauthority andpermissions.

• Regular Review: Frequently examine and modify authorizationsinaccordancewithmodificationsto jobrolesandresponsibilities.

• Role Hierarchy: Establishing a clear position hierarchywillprovideeffectiveaccesscontrolwhile keepingthingssimple.

• Audit Trails: Activate audit trails to keep track of modifications to roles and permissions for transparency.

7.5 Compliance Adherence and Regulatory Standards [26]:

For several organizations, adherence towards compliance and regulatory standards is mandatory. Among the best practicesinthisfieldofstudyare:

• Compliance Framework: Create a thorough complianceframeworkthatcomplieswithlocaland sector-specificlegalstandards.

• RegularEvaluations:Performroutineevaluationsto verify continuous compliance and to quickly addressanynon-complianceissues.

• Documentation and Reporting: Keep thorough recordsofyourcomplianceactivitiesforinspection purposes.

• Training and Awareness: To promote a culture of compliance, educate staff members on legal obligationsandbestpractices.

8. CONCLUSIONS

Cloud computing has revolutionized innovation and efficiencyinaworldcharacterizedbydigitaltransformation. The essential significance of cloud security cannot be emphasizedasbusinessesemploythecloudmoreandmore to improve their operations. This conclusion section summarizes major conclusions from the analysis of cloud security, emphasizes the role of cloud security in the growing scope of IT, examines over possible future consequences,andproposesareasforadditionalresearch.

8.1 Recap of Key Findings:

Acomprehensiveinvestigationoncloudsecurityhasyielded thefollowingsignificantconclusions:

• Shared Responsibility Model: In a shared responsibilitymodel,bothcloudserviceproviders andtheirclientsareresponsibleforsecurity.This paradigmplacesastrongemphasisonthevalueof cooperationandanappreciationofindividualroles.

• Strategies and Best Practices: Prominent cloud serviceprovidershaveoutlinedextensivesecurity strategies and best practices, including Amazon WebServices(AWS),GoogleCloudPlatform(GCP), IBM Cloud, and Microsoft Azure. These include proactive security measures, encryption, compliance adherence, and identity and access management.

• ChallengesinCloudSecurity:Databreaches,worries aboutregulatorycompliance,andthenecessityfor efficientmonitoringandauditingtoolsarejustafew of the difficulties that the changing cloud security landscapeprovides.

• Security Audits and Assessments: To maintain a strong security posture in the cloud, regular inspections of security, assessments of vulnerabilitiesandcomplianceauditsarecrucial.

• Multi-Factor Authentication and Encryption: MFAandencryptionmeasuresmustbeemployedin ordertosecureaccesstoandthestorageofdatain thecloud.

• Role-BasedAccessControl(RBAC):Byensuringthat access permissions are issued in accordance with the concept of least privilege, role-based access control(RBAC)helpstoreducesecurityrisks.

• Standards for regulatory compliance: For enterprises using the cloud, compliance with regionalandindustry-specificregulatorynormsis essential.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page202

8.2 Significance of Cloud Security in IT Growth:

It is impossible to underestimate the importance of cloud security in the expansion of the IT industry. The agility, scalability, and cost-effectiveness that businesses need to succeedinthedigitalagearesupportedbycloudcomputing. Strong cloud security not only protects sensitive data but alsopromotesuserandcustomerconfidence.ItenablesIT growth on a global scale by empowering organizations to innovatewithoutcompromisingsecurity

IRJET sample template format ,Conclusion content comes here. Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusioncontentcomes hereConclusioncontentcomes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here Conclusion content comes here . Conclusioncontentcomeshere

REFERENCES

[1] Kushida, K. E., Murray, J., &Zysman, J. (2015). Cloud computing: From scarcity to abundance.Journal of Industry,CompetitionandTrade,15,5-19.

[2] “A Brief History of Cloud Computing”, https://www.dataversity.net/brief-history-cloudcomputing/

[3] Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.ProcediaTechnology,12,529-534

[4] Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., &Ghalsasi,A.(2011).Cloudcomputing The business perspective.Decisionsupportsystems,51(1),176-189

[5] “Themostimportantcloudadvancesofthedecade”, https://www.techrepublic.com/article/the-mostimportant-cloud-advances-of-the-decade/

[6] Kolevski,D.,Michael,K.,Abas,R.,&Freeman,M.(2022, November). Cloud computing data breaches in news media: Disclosure of personal and sensitive data. In2022IEEEInternationalSymposiumonTechnology andSociety(ISTAS)(Vol.1,pp.1-11).IEEE.

[7] “https://aws.amazon.com/what-is/mfa/”, https://aws.amazon.com/what-is/mfa/.

[8] Hong,J.,Dreibholz,T.,Schenkel,J.A.,&Hu,J.A.(2019). Anoverviewofmulti-cloudcomputing.InWeb,Artificial IntelligenceandNetworkApplications:Proceedingsof theWorkshopsofthe33rdInternationalConferenceon Advanced Information Networking and Applications

(WAINA-2019) 33(pp. 1055-1068). Springer InternationalPublishing.

[9] Torkura, K. A., Sukmana, M. I., Cheng, F., &Meinel, C. (2021). Continuous auditing and threat detection in multi-cloudinfrastructure.Computers&Security,102, 102124.

[10] Boneder, S. (2023).Evaluation and comparison of the security offerings of the big three cloud service providersAmazonWebServices,MicrosoftAzureand Google Cloud Platform(Doctoral dissertation, TechnischeHochschuleIngolstadt).

[11] “IAM overview”, https://cloud.google.com/iam/docs/overview

[12] “Overview of AWS identity management:”, https://docs.aws.amazon.com/IAM/latest/UserGuide/i ntroduction_identity-management.html.

[13] “Security Control: Identity management”, https://learn.microsoft.com/enus/security/benchmark/azure/mcsb-identitymanagement

[14] “IBM Security Verify: IAM solutions”, https://www.ibm.com/verify?utm_content=SRCWW&p 1=Search&p4=43700068116305118&p5=p&gclid=CjwK CAjwo9unBhBTEiwAipC116h9gzYxI7RNJ8rkcI1jPMtJcd 8lKSWzMCKK9xuMhUqXPvquMnLDchoCb6UQAvD_BwE &gclsrc=aw.ds

[15] “CloudKeyManagement”, https://cloud.google.com /security-key-management

[16] “AWS Key Management Service”, https://aws.amazon.com/kms/

[17] Dasher,G.,Envid,I.,&Calder,B.(2022).Architectures for Protecting Cloud Data Planes.arXiv preprint arXiv:2201.13010.

[18] Kumar,R.,&Goyal,R.(2019).Assuranceofdatasecurity and privacy in the cloud: A three-dimensional perspective.SoftwareQualityProfessional,21(2),7-26.

[19] Gleb,T.,&Gleb,T.(2021).SystematicCloudMigration. Apress.“CompareAWSandAzureservices to Google Cloud”, https://cloud.google.com/docs/getstarted/aws-azure-gcp-service-comparison

[20] “IBM Storage Protect for Cloud”, https://www.ibm.com/products/storage-protect-forcloud?utm_content=SRCWW&p1=Search&p4=4370007 6608394579&p5=p&gclid=CjwKCAjwo9unBhBTEiwAip C11-

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page203

3sMjSUOBGOv3Mmog3AKvzBnxXwLdwYHr7CuI0D7Vrs

MaDLBsFNfRoChckQAvD_BwE&gclsrc=aw.ds

[21] Muralidhara, P. (2017). THE EVOLUTION OF CLOUD COMPUTING SECURITY: ADDRESSING EMERGING THREATS.INTERNATIONAL JOURNAL OFCOMPUTER SCIENCEANDTECHNOLOGY,1(4),1-33.

[22] “What is Multi-Factor Authentication”, https://intellipaat.com/blog/multi-factorauthentication/

[23] Xiaohui,X.(2013,June).Studyonsecurityproblemsand key technologies of the internet of things. In2013 International conference on computational and informationsciences(pp.407-410).IEEE.

[24] Lopez,J.,&Rubio,J.E.(2018).Accesscontrolforcyberphysicalsystemsinterconnectedtothecloud.Computer Networks,134,46-54.

[25] Bieger, V. (2023).A decision support framework for multi-cloudservicecomposition(Master'sthesis).

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page204

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.