Building Trust in Cloud Computing:Strategies for Resilient Security

Read the full article See related articles

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

Cloud computing is a technology that will change how data is stored, managed, and accessed. It reduces the need for users to set up hardware and computing resources on demand, and it eases things for businesses and individuals, but as cloud computing becomes more common, security problems are becoming a big issue for its future growth. They focus on the three basic models of cloud computing: Software as a Service-SaaS, Platform as a Service-PaaS, and Infrastructure as a Service-IaaS; add the main architectural models: public, private, hybrid, and multi-cloud, analyse their advantages and disadvantages, as well as potential security risks. The cloud computing security system is a most crucial aspect. It includes how technologies such as identity and access management, firewalls, intrusion detection systems, data encryption, etc., protect data and examines the possibility of using new technologies such as artificial intelligence, blockchain, and zero-trust architectures. It should greatly improve the security of cloud computing, using intelligence in threat detection, decentralised management, and ongoing verification. Some common issues are dealt with, including data leakage, unsafe APIs, and insider threats. The importance of focusing on multi-layer defence is then highlighted. We look at the current state of cloud security technologies and strategies, along with future improvements we need. The goal is for cloud service providers and users to work together in using a layered security approach, a shared responsibility model, and new technologies to create a safe and dependable cloud environment. This security model will be able to cope not only with the complexity of network threats but also with the continuity of cloud computing technological development, thereby carrying important values in references for the research and practice of related technologies.

Article activity feed