Advanced Threat Protection in Cloud Security Architecture: Techniques for Safeguarding Data

Authors

  • Anika Patel Department of Computer Science, University of Bolton Author
  • Rishi Kumar School of Information Technology, London Metropolitan University Author

DOI:

https://doi.org/10.5281/

Keywords:

Advanced Threat Protection (ATP), Cloud Security, Data Protection, Cybersecurity, Identity and Access Management (IAM), Data Encryption, Tokenization.

Abstract

The rapid adoption of cloud computing has transformed how organizations manage data and services, offering unprecedented scalability, flexibility, and cost-efficiency. However, this transition has also introduced new security challenges, particularly in protecting sensitive data from advanced threats. This paper explores Advanced Threat Protection (ATP) within cloud security architecture, analyzing techniques and strategies for safeguarding data against sophisticated cyber threats. By examining current methodologies, tools, and best practices, this research aims to provide a comprehensive understanding of how organizations can enhance their cloud security posture.

References

[1] H. K. Mistry, C. Mavani, A. Goswami, and R. Patel, "A Survey Visualization Systems For Network Security," Educational Administration: Theory and Practice, vol. 30, no. 7, pp. 805-812, 2024.

[2] M. Abdel-Rahman, "Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world," Eigenpub Review of Science and Technology, vol. 7, no. 1, pp. 138-158, 2023.

[3] A. Aljumah and T. A. Ahanger, "Cyber security threats, challenges and defence mechanisms in cloud computing," IET communications, vol. 14, no. 7, pp. 1185-1191, 2020.

[4] H. K. Mistry, C. Mavani, A. Goswami, and R. Patel, "Artificial intelligence for networking," Educational Administration: Theory and Practice, vol. 30, no. 7, pp. 813-821, 2024.

[5] V. Chang and M. Ramachandran, "Towards achieving data security with the cloud computing adoption framework," IEEE Transactions on services computing, vol. 9, no. 1, pp. 138-151, 2015.

[6] I. Gupta, A. K. Singh, C.-N. Lee, and R. Buyya, "Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions," IEEE Access, vol. 10, pp. 71247-71277, 2022.

[7] P. Keshattiwar, P. Lokulwar, and P. Saraf, "Data Defender’s Shield in Safeguarding Information through Advanced Encryption and Access Management in Cloud-Based Applications," in 2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET), 2024: IEEE, pp. 1-6.

[8] H. K. Mistry, C. Mavani, A. Goswami, and R. Patel, "The Impact Of Cloud Computing And Ai On Industry Dynamics And Competition," Educational Administration: Theory and Practice, vol. 30, no. 7, pp. 797-804, 2024.

[9] A. M. Sauber, P. M. El-Kafrawy, A. F. Shawish, M. A. Amin, and I. M. Hagag, "A new secure model for data protection over cloud computing," Computational Intelligence and Neuroscience, vol. 2021, no. 1, p. 8113253, 2021.

[10] R. Patel, A. Goswami, H. K. Mistry, and C. Mavani, "Application Layer Security For Cloud," Educational Administration: Theory and Practice, vol. 30, no. 6, pp. 1193-1198, 2024.

[11] G. Kulkarni, J. Gambhir, T. Patil, and A. Dongare, "A security aspects in cloud computing," in 2012 IEEE International Conference on Computer Science and Automation Engineering, 2012: IEEE, pp. 547-550.

[12] R. Kumar and R. Goyal, "On cloud security requirements, threats, vulnerabilities and countermeasures: A survey," Computer Science Review, vol. 33, pp. 1-48, 2019.

[13] R. Patel, A. Goswami, H. K. K. Mistry, and C. Mavani, "Cognitive Computing For Decision Support Systems: Transforming Decision-Making Processes," Educational Administration: Theory and Practice, vol. 30, no. 6, pp. 1216-1221, 2024.

[14] G. Pathak and B. M. Shankar, "Designing a Robust Security Framework for Safeguarding Cloud Computing Environments in the Age of Cyber Threats," Research Journal of Computer Systems and Engineering, vol. 4, no. 1, pp. 55-63, 2023.

[15] H. Rehan, "AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age," Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, vol. 1, no. 1, pp. 132-151, 2024.

Downloads

Published

2024-10-11

Similar Articles

11-20 of 46

You may also start an advanced similarity search for this article.