Enhancing Security in Enterprise Cloud Computing Applications: Concerns and Solutions

Enhancing Security in Enterprise Cloud Computing Applications: Concerns and Solutions

Authors

  • PAWAN WHIG

Abstract

Enterprise cloud computing applications have revolutionized the way organizations operate and manage their data and applications. However, the adoption of cloud computing also introduces significant security challenges. This paper explores the key security concerns associated with enterprise cloud computing applications and provides comprehensive solutions to mitigate these risks. From data breaches and identity management to compliance and encryption, this research offers valuable insights into safeguarding critical enterprise assets in the cloud.

References

Atluri, H., & Thummisetti, B. S. P. (2023). Optimizing Revenue Cycle Management in Healthcare: A Comprehensive Analysis of the Charge Navigator System. International Numeric Journal of Machine Learning and Robots, 7(7), 1-13.

Atluri, H., & Thummisetti, B. S. P. (2022). A Holistic Examination of Patient Outcomes, Healthcare Accessibility, and Technological Integration in Remote Healthcare Delivery. Transactions on Latest Trends in Health Sector, 14(14).

Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security.

Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media.

Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. Proceedings of the 2009 ACM workshop on Cloud computing security.

Rizvi, M., Mahmood, A. N., & Hu, J. (2012). A survey of network flow applications in intrusion detection and prevention systems. Journal of Network and Computer Applications, 35(2), 471-487.

Gartner. (2020). Gartner Top 10 Security Projects for 2020. Retrieved from https://www.gartner.com/en/information-technology/articles/top-10-security-projects

Kunduru, A. R. (2023). Industry best practices on implementing oracle cloud ERP security. International Journal of Computer Trends and Technology, 71(6), 1-8. https://doi.org/10.14445/22312803/IJCTT-V71I6P101

Kunduru, A. R. (2023). Cloud Appian BPM (Business Process Management) Usage In health care Industry. IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, 12(6), 339-343. https://doi.org/10.17148/IJARCCE.2023.12658

WHIG, P. (2023). Blockchain Revolution: Innovations, Challenges, and Future Directions. International Journal of Machine Learning for Sustainable Development, 5(3), 16-25.

Whig, P., Kouser, S., Bhatia, A. B., Nadikattu, R. R., & Sharma, P. (2023). Explainable Machine Learning in Healthcare. In Explainable Machine Learning for Multimedia Based Healthcare Applications (pp. 77-98). Cham: Springer International Publishing.

Whig, P., Velu, A., Nadikattu, R. R., & Alkali, Y. J. (2023). Computational Science Role in Medical and Healthcare‐Related Approach. Handbook of Computational Sciences: A Multi and Interdisciplinary Approach, 245-272.

Kunduru, A. R. (2023). Effective usage of artificial intelligence in enterprise resource planning applications. International Journal of Computer Trends and Technology, 71(4), 73-80. https://doi.org/10.14445/22312803/IJCTT-V71I4P109

Kunduru, A. R. (2023). Recommendations to advance the cloud data analytics and chatbots by using machine learning technology. International Journal of Engineering and Scientific Research, 11(3), 8-20.

WHIG, P. (2023). A Comprehensive Review of Mask Detection Using Artificial Intelligence: Methods, Challenges, and Applications. International Journal of Sustainable Development in Computing Science, 5(2), 11-20.

Kunduru, A. R. (2023). Security concerns and solutions for enterprise cloud computing applications. Asian Journal of Research in Computer Science, 15(4), 24–33. https://doi.org/10.9734/ajrcos/2023/v15i4327

Sharma, A., Kumar, A., & Whig, P. (2015b). On the performance of CDTA based novel analog inverse low pass filter using 0.35 µm CMOS parameter. International Journal of Science, Technology & Management, 4(1), 594–601.

Tomar, U., Chakroborty, N., Sharma, H., & Whig, P. (2021). AI based Smart Agricuture System. Transactions on Latest Trends in Artificial Intelligence, 2(2).

Velu, A., & Whig, P. (2021a). Protect Personal Privacy And Wasting Time Using Nlp: A Comparative Approach Using Ai. Vivekananda Journal of Research, 10, 42–52.

Published

2023-08-01

How to Cite

WHIG, P. (2023). Enhancing Security in Enterprise Cloud Computing Applications: Concerns and Solutions. International Scientific Journal for Research, 5(5). Retrieved from https://isjr.co.in/index.php/ISJR/article/view/138

Issue

Section

Articles
Loading...