• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Paper
Search Paper
Cancel
Ask R Discovery
Explore

Feature

  • menu top paper My Feed
  • library Library
  • translate papers linkAsk R Discovery
  • chat pdf header iconChat PDF
  • audio papers link Audio Papers
  • translate papers link Paper Translation
  • chrome extension Chrome Extension

Content Type

  • preprints Preprints
  • conference papers Conference Papers
  • journal articles Journal Articles

More

  • resources areas Research Areas
  • topics Topics
  • resources Resources
git a planGift a Plan

Cloud Security Research Articles

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
2748 Articles

Published in last 50 years

Related Topics

  • Security Of Cloud Services
  • Security Of Cloud Services
  • Cloud Computing System
  • Cloud Computing System
  • Cloud Service Providers
  • Cloud Service Providers
  • Cloud Environment
  • Cloud Environment
  • Cloud Users
  • Cloud Users
  • Cloud Storage
  • Cloud Storage
  • Cloud Services
  • Cloud Services
  • Cloud Computing
  • Cloud Computing

Articles published on Cloud Security

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
2651 Search results
Sort by
Recency
Implementing Dynamic Confidential Computing for Continuous Cloud Security Posture Monitoring to Develop a Zero Trust-Based Threat Mitigation Model

Implementing Dynamic Confidential Computing for Continuous Cloud Security Posture Monitoring to Develop a Zero Trust-Based Threat Mitigation Model

Read full abstract
  • Journal IconInternational Journal of Innovative Science and Research Technology
  • Publication Date IconMay 13, 2025
  • Author Icon Olumide Bashiru Abiola + 1
Just Published Icon Just Published
Cite IconCite
Save

A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage

Abstract— This paper introduced a robust and efficient framework designed to ensure secure dynamic data handling and public auditing in cloud storage systems. The primary goal was to strengthen data integrity and user confidentiality using advanced cryptographic methods and privacy-aware third-party auditing (TPA). An in- depth analysis of existing cloud security models was conducted to uncover persistent challenges such as secure management of data updates, protection of user privacy, and reliable auditing within potentially untrusted cloud environments. To address these issues, a modular system architecture was developed that supports dynamic data operations—including insertion, deletion, and modification—while enabling secure data outsourcing. The auditing mechanism allows a trusted third party to verify data integrity without exposing sensitive information, ensuring both transparency and privacy. Additionally, the framework incorporates lightweight cryptographic algorithms aimed at reducing computational and communication costs.A comprehensive feasibility study was performed, and the necessary hardware and software requirements were identified to support real-world implementation. The proposed solution demonstrated high potential for scalability, efficiency, and user trust. Overall, the framework offers a practical pathway toward secure, transparent, and user-centric cloud data management, making it a valuable contribution to advancing cloud storage security. Keywords: Cloud Storage Systems, Secure Dynamic Data Handling, Public Auditing, Data Integrity, User Confidentiality, Cryptographic Methods, Privacy-Aware, Third-Party Auditing (TPA), Cloud Security Models, Data Updates, User Privacy, Untrusted Cloud Environments, Modular System Architecture, Dynamic Data Operations, Secure Data Outsourcing, Auditing Mechanism, Trusted Third Party, Lightweight Cryptographic Algorithms, Computational Costs, Communication Costs, Feasibility Study, Hardware Requirements, Software Requirements, Scalability, Efficiency, User Trust, Transparent Data Management, Cloud Data Security.

Read full abstract
  • Journal IconINTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
  • Publication Date IconMay 8, 2025
  • Author Icon Prof.S.S Bhuite
Just Published Icon Just Published
Cite IconCite
Save

The Architecture of Trust: Deep Diving into Cloud Security Infrastructure

The Architecture of Trust: Deep Diving into Cloud Security Infrastructure examines the sophisticated technical foundations underpinning modern cloud security systems. This comprehensive analysis explores the multi-layered approach implemented by hyperscalers, beginning with custom silicon security processors that establish hardware roots of trust and extending through measured boot processes, microsegmentation network architecture, and advanced encryption implementations. This article details how zero trust principles materialize through attribute-based access controls, continuous threat detection systems, and distributed security frameworks. By illuminating the intricate interplay between hardware and software security measures, this exploration provides critical insights for organizations navigating increasingly digital supply chains and preparing for emerging technologies like confidential computing and homomorphic encryption.

Read full abstract
  • Journal IconJournal of Computer Science and Technology Studies
  • Publication Date IconMay 5, 2025
  • Author Icon Aravind Guduru
Just Published Icon Just Published
Cite IconCite
Save

Proactive Security with AI: Revolutionizing Cloud Infrastructure Protection

The integration of artificial intelligence in cloud security represents a transformative shift in how organizations protect their digital infrastructure. AI-driven security automation has revolutionized threat detection, response mechanisms, and vulnerability management across enterprise environments. Organizations implementing these advanced systems have experienced significant improvements in threat detection capabilities, reduced response times, and enhanced operational efficiency. The combination of machine learning models, behavioral analytics, and automated response mechanisms has enabled proactive threat prevention and robust security posture maintenance. The evolution from reactive to proactive security management, coupled with sophisticated detection methods and immediate response capabilities, has fundamentally altered the landscape of enterprise cybersecurity.

Read full abstract
  • Journal IconJournal of Computer Science and Technology Studies
  • Publication Date IconMay 3, 2025
  • Author Icon Krupal Gangapatnam
Just Published Icon Just Published
Cite IconCite
Save

Transforming Military Healthcare Education and Training: AI Integration for Future Readiness.

Artificial intelligence (AI) technologies have spread throughout the world and changed the way that many social functions are conducted, including health care. Future large-scale combat missions will likely require health care professionals to utilize AI tools among other tools in providing care for the Warfighter. Despite the need for an AI-capable health care force, medical education lacks an integration of medical AI knowledge. The purpose of this manuscript was to review ways that military health care education can be improved with an understanding of and using AI technologies. This article is a review of the literature regarding the integration of AI technologies in medicine and medical education. We do provide examples of quotes and images from a larger USU study on a Faculty Development program centered on learning about AI technologies in health care education. The study is not complete and is not the focus of this article, but was approved by the USU IRB. Effective integration of AI technologies in military health care education requires military health care educators that are willing to learn how to safely, effectively, and ethically use AI technologies in their own administrative, educational, research, and clinical roles. Together with health care trainees, these faculties can help to build and co-create AI-integrated curricula that will accelerate and enhance the military health care curriculum of tomorrow. Trainees can begin to use generative AI tools, like large language models, to begin to develop their skills and practice the art of generating high-quality AI tools that will improve their studies and prepare them to improve military health care. Integration of AI technologies in the military health care environment requires close military-industry collaborations with AI and security experts to ensure personal and health care information security. Through secure cloud computing, blockchain technologies, and Application Programming Interfaces, among other technologies, military health care facilities and systems can safely integrate AI technologies to enhance patient care, clinical research, and health care education. AI technologies are not a dream of the future, they are here, and they are being integrated and implemented in military health care systems. To best prepare the military health care professionals of the future for the reality of medical AI, we must reform military health care education through a combined effort of faculty, students, and industry partners.

Read full abstract
  • Journal IconMilitary medicine
  • Publication Date IconMay 3, 2025
  • Author Icon Justin G Peacock + 5
Just Published Icon Just Published
Cite IconCite
Save

Blockchain-Enhanced Cloud Security: A Scalable Framework with Privacy and Transparency

Cloud computing that is used for data management has proliferated and changed data management, but brings with it serious security challenges such as data breach, unauthorized access, and insider threat. The distributed and dynamic nature of modern cloud environment makes it difficult for centralized cloud security frameworks to address the issue, requiring innovations. Yet, blockchain technology, in its decentralized, immutable, and cryptographically secure ledger applies to fortify the cloud security. Intending to tackle the security problem of chain leveraging, this research advances a hybrid blockchain cloud security framework by proposing smart contracts for automated access control, ZKPs for privacy preserving authentication, and XAI for explanation of the adversarial attack detection. It provides data integrity, puts the access management, and in real time anomaly detection while scalability. Adaptive smart contract policies, ZKP based identity verification and XAI driven insights to foster trust among the stakeholders are the key innovations. Experimental analysis validates that a 20–25% reduction in incident of unauthorized access and a 30% increase in threat detection accuracy are realized, through various attack surfaces, by this new cloud security system in comparison to the traditional cloud security systems. Finally, this work gains significance in advancing secure cloud adoption, which will contribute to global level of cybersecurity resilience and promote the standards for data protection.

Read full abstract
  • Journal IconInternational Journal on Science and Technology
  • Publication Date IconMay 2, 2025
  • Author Icon Parth Khandelwal + 2
Just Published Icon Just Published
Cite IconCite
Save

Enhanced cloud security with Bi-Optimized Sand Cat Swarm and Conv-Bi-ALSTM deep learning models

Enhanced cloud security with Bi-Optimized Sand Cat Swarm and Conv-Bi-ALSTM deep learning models

Read full abstract
  • Journal IconExpert Systems with Applications
  • Publication Date IconMay 1, 2025
  • Author Icon Lubna Ansari
Just Published Icon Just Published
Cite IconCite
Save

Learning from cloud datacenter failures: A Case Study of the CrowdStrike Service Disruption

The CrowdStrike service disruption in March 2024 exposed critical vulnerabilities in modern cloud security infrastructure, affecting multiple sectors, including aviation, emergency services, and enterprise operations. The incident, which centered on the Falcon platform's authentication system, revealed the cascading effects of centralized authentication failures in interconnected cloud environments. The event highlighted the importance of distributed architectures, service isolation, and robust failover mechanisms in cloud security services. Through a detailed evaluation of the incident's impact across various sectors, the documentation presents key learnings and strategic recommendations for both cloud service providers and enterprise customers to enhance their security architecture resilience and operational readiness.

Read full abstract
  • Journal IconWorld Journal of Advanced Engineering Technology and Sciences
  • Publication Date IconApr 30, 2025
  • Author Icon Ramamohan Kummara
Just Published Icon Just Published
Cite IconCite
Save

A Research Paper on Cryptography in Cloud Computing

ABSTRACT: - Cloud computing offers scalable and cost-effective solutions for data storage and processing, enabling organizations to access computing resources on demand. However, as data is transferred to and managed by third-party providers, concerns about security, privacy, and data integrity become critical. Cryptography serves as a fundamental technology to address these challenges, ensuring that sensitive information remains protected throughout its lifecycle in the cloud. Various cryptographic techniques are employed to secure data in cloud environments. Symmetric and asymmetric encryption algorithms safeguard data at rest and in transit, while more advanced methods like homomorphic encryption and searchable encryption allow secure computations and queries over encrypted data without compromising confidentiality. Cryptographic methods also support essential functions like digital signatures and secure authentication, which help verify data integrity and user identity across distributed systems. Despite its benefits, the implementation of cryptography in cloud computing presents challenges, particularly in key management, scalability, and performance. Effective solutions must include secure key generation, distribution, and storage, often involving trusted third parties or hardware security modules. Additionally, the rise of quantum computing poses potential threats to existing cryptographic algorithms, necessitating the exploration of post-quantum cryptography to secure future cloud infrastructures. As cloud technology evolves, cryptography will remain essential to building secure, trustworthy, and resilient cloud services.

Read full abstract
  • Journal IconInternational Scientific Journal of Engineering and Management
  • Publication Date IconApr 30, 2025
  • Author Icon Vishal Kumar Singh
Just Published Icon Just Published
Cite IconCite
Save

Hybrid Cloud Boom

Finding the Sweet Spot Between Flexibility, Security, and Performance Hybrid cloud use has sparked a big change in how companies use cloud computing. They want to strike the right balance between flexibility, security, and performance. Hybrid cloud solutions mix public and private cloud setups. This lets businesses get the best of both worlds. They enjoy the easy scaling and cost savings of public clouds. At the same time, they keep tight control and protect data with private clouds. This approach allows companies to shape their cloud plans to fit their exact business needs and follow the rules they must obey. Companies of all sizes are now opting for hybrid cloud setups to handle different workloads and meet changing business needs. Spreading workloads across multiple cloud platforms gives businesses more flexibility and reduces the risk of being stuck with one vendor. Hybrid clouds also support things like backup plans, data analysis, and edge computing making them a key part of modern IT plans (Gartner, 2024). More and more companies are using hybrid clouds because of better cloud management tools and tech. These new tools make it easier to run complex setups with multiple clouds. They help companies use resources better, control costs, and follow industry rules. This means hybrid cloud solutions are helping companies in all industries go digital (IDC, 2024). This report will look at why hybrid clouds are becoming so popular, what's good and bad about them, and how businesses are using hybrid cloud plans to stay ahead in our digital world.

Read full abstract
  • Journal IconWorld Journal of Advanced Engineering Technology and Sciences
  • Publication Date IconApr 30, 2025
  • Author Icon Abirami Dasu Jegadeesh + 1
Just Published Icon Just Published
Cite IconCite
Save

Quality engineering in modern financial services: A framework for security, compliance and resilience

This article presents an integrated quality engineering framework for modern financial services, addressing the unique challenges posed by the digital transformation of the industry. It examines the evolution from traditional testing to comprehensive quality engineering approaches that are essential for ensuring security, compliance, and resilience in financial technology systems. The framework encompasses various critical aspects including cloud security architecture, regulatory compliance validation, AI-driven financial systems, and resilience engineering. Through analysis of implementation methodologies, validation approaches, and case studies, the article demonstrates how financial institutions can effectively balance innovation with risk management. The proposed framework provides actionable insights for financial organizations seeking to enhance their quality engineering practices while navigating complex regulatory landscapes and emerging technological challenges.

Read full abstract
  • Journal IconWorld Journal of Advanced Engineering Technology and Sciences
  • Publication Date IconApr 30, 2025
  • Author Icon Jainik Sudhanshubhai Patel
Just Published Icon Just Published
Cite IconCite
Save

Security challenges and mitigation strategies in multi-cloud environments: A comprehensive analysis

Multi-cloud architectures have emerged as the dominant enterprise computing strategy, with organizations increasingly distributing workloads across multiple cloud service providers to enhance operational flexibility, geographical resilience, and service specialization. This comprehensive examination of multi-cloud security challenges reveals significant complexities across identity management, data protection, configuration governance, and compliance frameworks. The heterogeneous nature of distributed cloud environments creates unique security vulnerabilities at integration points, particularly affecting identity systems where compromised credentials serve as primary attack vectors. Configuration inconsistencies represent substantial risks, with organizations experiencing dramatically higher rates of security incidents compared to single-cloud deployments. Data protection presents additional challenges as information flows between environments with disparate encryption implementations and security controls. Organizations implementing integrated approaches—including Zero Trust architectures, Infrastructure as Code with embedded security validation, Cloud Security Posture Management, and unified identity governance—demonstrate measurable security improvements while maintaining operational agility. Effective multi-cloud security requires coordinated strategies that transcend individual provider capabilities while leveraging cloud-specific strengths, establishing consistent protection regardless of where workloads and data reside.

Read full abstract
  • Journal IconWorld Journal of Advanced Research and Reviews
  • Publication Date IconApr 30, 2025
  • Author Icon Rehana Sultana Khan
Just Published Icon Just Published
Cite IconCite
Save

Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency

Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategies can lead to significant financial waste due to inefficient resource allocation, redundant workloads, and unpredictable cloud expenses. Traditional methods often rely on static provisioning and manual decision-making, leading to suboptimal cloud resource utilization. This research introduces an AI-driven framework for intelligent cloud planning and migration aimed at reducing cloud costs while maintaining high performance and compliance standards. The proposed framework leverages machine learning (ML), deep learning (DL), and reinforcement learning (RL) techniques to automate workload distribution, real-time scaling, and dynamic cost optimization. It integrates Predictive Analytics Engine: Uses AI models (Long Short-Term Memory LSTMs, CNNs, and Transformers) to analyze historical workload data and forecast future resource demands. Optimization Algorithm: Implements AI-driven cost minimization functions, optimizing resource allocation while maintaining Quality of Service (QoS). Automated Migration Engine: Reduces manual intervention by executing AI-based cloud workload transfers efficiently. Security and Compliance Module: Uses explainable AI (XAI) and federated learning to maintain cloud security, privacy, and regulatory compliance. A proof of concept (PoC) is developed and evaluated across multiple cloud platforms (AWS, Azure, Google Cloud) with real-world datasets. Experimental results indicate that the AI-driven framework achieves: Cost savings of up to 42% compared to traditional cloud migration strategies. Resource utilization improvement by 53%, ensuring minimal wastage. Reduction in system downtime by 75%, leading to higher reliability. Reduction in manual intervention by 85%, automating resource scaling and load balancing. The research paper also presents real-world case studies across finance, healthcare, e-commerce, and manufacturing sectors, demonstrating the tangible impact of AI-based cloud optimization. This research explores future advancements in cloud computing, including Quantum AI for cloud workload acceleration, Blockchain for transparent cloud cost auditing, and Decentralized AI governance for multi-cloud management. This study contributes to the growing field of AI-driven cloud cost optimization, providing a roadmap for enterprises, cloud architects, and AI researchers to achieve cost-efficient, high-performance, and automated cloud management.

Read full abstract
  • Journal IconWorld Journal of Advanced Engineering Technology and Sciences
  • Publication Date IconApr 30, 2025
  • Author Icon Sasibhushan Rao Chanthati
Just Published Icon Just Published
Cite IconCite
Save

Enhancing Cloud Security and Performance: Context-Aware Group Lasso and Deep Reinforcement Learning for Attack Detection

Enhancing Cloud Security and Performance: Context-Aware Group Lasso and Deep Reinforcement Learning for Attack Detection

Read full abstract
  • Journal IconInternational Journal of Intelligent Engineering and Systems
  • Publication Date IconApr 30, 2025
Just Published Icon Just Published
Cite IconCite
Save

Framework for Cloud Data Security Using Agentic AI

Cloud platforms are ever more vulnerable to advanced cyber threats, which demand intelligent and self-reliant security systems. We introduce CloudShield, a prototype Agentic AI system for mimicking live cloud data protection in Azure platforms. The system mimics round-the-clock log collection in Azure-type protocols, employs the Isolation Forest algorithm to identify outliers, and responds automatically to attacks such as brute-force attacks and malware. Logs are locally stored in a SQLite database, encrypted for secure storage, and can be deployed entirely self-contained without dependencies. CloudShield includes an interactive real-time dashboard for threat visualization and system analysis. Its agent-based, modular architecture supports scalability, automation, and high detection rates—making it a strong experimental model for current cloud security research.

Read full abstract
  • Journal IconInternational Journal of Science and Research Archive
  • Publication Date IconApr 30, 2025
  • Author Icon Naseer R + 4
Just Published Icon Just Published
Cite IconCite
Save

IoT-Powered Real-Time InPatient Monitoring System with Seamless Connectivity and Insights

IoT driven solutions for efficient and continuous patient monitoring is increasingly needed given that several resource limited and understaffed healthcare facilities require these solutions. In this paper, we describe a scalable and privacy respecting real time in-patient monitoring system coupled with a hybrid edge cloud architecture. The system is powered by an ESP32-C3 and the Gravity: MAX30102 heart and SpO₂ sensor, and a LM35 sensor for being body temperature. InfluxDB powered edge node is a node which processes sensor data using edge and then stores locally with low latency access and offline functionality. Also, the system synchronizes historical data to a secure cloud database as well as in sync to the database for analysis in advanced analysis and long-term trend monitoring. The real time dashboards and alert mechanisms that healthcare workers are empowered with, enables them to proactively take decisions as opposed to employing manual interventions. The system achieves performance, high reliability, and clinical utility for use in resource poor countries: an important step towards the development of cheap, automated vital tracking systems.

Read full abstract
  • Journal IconInternational Journal for Research in Applied Science and Engineering Technology
  • Publication Date IconApr 30, 2025
  • Author Icon Rajdeep Saha
Just Published Icon Just Published
Cite IconCite
Save

Agentic AI for Secure Financial Data Processing: Real-Time Analytics, Cloud Migration, and Risk Mitigation in AWS-Based Architectures

Using Agentic AI in concert with AWS Full Stack Development, this study offers a technically solid and scalable method to securely process financial data. AWS Lambda for serverless computation, Amazon S3 for scalable storage, AWS Glue for data classification and transformation, Athena for SQL-like querying, and QuickSight for interactive visualisation comprise the fundamental elements of the system. While Agentic AI modules enable autonomous decision-making abilities to regulate data integrity, recognise abnormalities, and adaptably react to compliance violations, Custom AWS configuration rules are used for real-time compliance monitoring. Tight guidelines like PCI-DSS and GDPR enable secure cloud migration, improved auditability, and policy execution. These guidelines open the path for real-time, low-latency analytics on enormous financial data. Combining data-driven insight production with intelligent control will help to build a transparent and strong environment fit for modern financial activities, as the suggested approach shows.

Read full abstract
  • Journal IconInternational Journal of Innovative Research in Science Engineering and Technology
  • Publication Date IconApr 30, 2025
  • Author Icon Rohit Kumar
Just Published Icon Just Published
Cite IconCite
Save

Detection and Response Strategies for Advanced Persistent Threats (APTs)

This study investigates Advanced Persistent Threats (APTs), a class of cyber-attacks distinguished by their sophisticated, state-sponsored nature and long-term, stealthy operations. Unlike typical cybercriminals focused on immediate gains, APT groups meticulously plan and execute multi-stage attacks to infiltrate networks and exfiltrate sensitive data over extended periods. To address the shortcomings of conventional security measures, we developed a comprehensive framework for detecting and responding to APTs. Our approach combines a systematic literature review, integration of established frameworks (such as the Cyber Kill Chain and MITRE ATT&CK), empirical simulations, and extensive expert consultations—including valuable peer feedback—to validate our methodology. The findings reveal that APTs follow a defined, multi-step process and exploit gaps in traditional defenses, thereby underscoring the effectiveness of advanced anomaly detection, behavioral analytics, and threat intelligence integration. Based on these insights, we propose a robust incident response framework that emphasizes rapid containment and recovery. The study concludes with actionable recommendations for adopting emerging technologies like artificial intelligence, Zero Trust architectures, and enhanced cloud security solutions to fortify organizational defenses against evolving cyber threats, while also outlining directions for future research to further refine these strategies.

Read full abstract
  • Journal IconInternational Journal of Scientific Research and Modern Technology
  • Publication Date IconApr 28, 2025
  • Author Icon Chris Gilbert + 2
Just Published Icon Just Published
Cite IconCite
Save

Harnessing Cloud Infrastructure for DevOps Excellence

The incorporation of cloud infrastructure with DevOps practices has converted the software growth and operations landscape, posing unparalleled advantages such as scalability, flexibility and improved collaboration. Cloud computing delivers the crucial resources that assists the DevOps principles, comprising CI/CD (Continuous Integration, Continuous Delivery) and fast iteration, which are focal to recent software development cycles. This review generates a detailed review of how cloud infrastructure enables DevOps excellence, converging on the role of key cloud services such as IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service) and SaaS (Software-as-a-Service). By inspecting the symbiotic association between cloud technologies and DevOps methodologies, this review deliberates how the cloud quickens application deployment, fosters collaboration among development and operations teams and enhances resource use. Though, numerous benefits of cloud-based DevOps, organizations faces some challenges in completely utilizing cloud infrastructure for DevOps success. The security concerns, cost management, incorporation with legacy systems and managing hybrid and multi-cloud environments are among the acute hindrances that organizations must tackle to exploit the advantages of cloud for DevOps. The paper examines the challenges and provides plans to overcome them, such as executing robust security practices, enhancing cloud cost management and safeguarding unified incorporation through hybrid environments. Moreover, the review focuses to the future of cloud-powered DevOps, highlighting developing trends such as server less computing, AI-driven DevOps and amended cloud security measures. By examining the above areas, this review targets to guide organizations in enhancing the DevOps progressions and attaining operational effectiveness through cloud implementation.

Read full abstract
  • Journal IconInternational Journal of Computational and Experimental Science and Engineering
  • Publication Date IconApr 27, 2025
  • Author Icon Linton Kuriakose John
Just Published Icon Just Published
Cite IconCite
Save

Analysis Study of Two Factor Authentication for Data Communication in Cloud

Development of cloud computing technologies will leads to higher security risks which provide solutions to preserve the data about an user using traditional single factor authentication model with few limitations. The proposed paper analyze the two factor authentication mechanism (2FA) which includes the SMS based security authentication techniques to evaluate the security measures which is enhanced. Literature reviews with existing researches are conducted to develop broad knowledge about 2FA methods for better understanding of the two factor authentication techniques. It will compare the analysis of security strength, user convenience and vulnerability avoidance ratios. Based on the comparison techniques followed in the paper will review and provide elaborate knowledge about existing methods of 2FA with its strength leads to the users to understand the cloud security mechanisms for easy prediction of weakness, strength are implemented.

Read full abstract
  • Journal IconInternational Journal of Innovative Research in Engineering
  • Publication Date IconApr 24, 2025
  • Author Icon S Ragunathan + 1
Just Published Icon Just Published
Cite IconCite
Save

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers