A SURVEY OF COMPREHENSIVE SECURITY APPROACHES IN CLOUD COMPUTING: FROM IDS TO LEGAL COMPLIANCE
Main Article Content
Abstract
The revolutionary technology that makes advantage of the internet to supply scalable and reasonably priced computer resources is cloud computing. But as cloud services become more widely used, security, privacy, and regulatory compliance have grown to be major issues. Including technological safeguards such as improved access control techniques, data protection mechanisms, homomorphic encryption, and IDS/IPS, this paper offers a thorough examination of cloud computing security solutions. Other cloud security standards that are analyzed include the NIST Cybersecurity Framework and the Cloud Control Matrix from the Cloud Security Alliance. The article discusses several legal and regulatory issues, including data sovereignty, audits, SLAs, and the shared responsibility paradigm between cloud service providers and clients. This research looks at both technological and legal factors in order to give a thorough knowledge of the strategies required to improve trust, safeguard sensitive data, and guarantee compliance in cloud settings. This demonstrates how applicable and useful the methods are in both local and global settings.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Download Copyright