Cybersecurity risk management in cloud computing environment

Suryaprakash Nalluri 1, *, Murali Mohan Malyala 2, SukanyaKonatam 3 and Kiran Kumar Kandagiri 4

1 University of Cumberlands, KY, USA.
2 Osmania University, Telangana India.
3 Vialto Partners, Texas, USA.
4 JNTU, Kakinada, India.
 
Review
International Journal of Science and Research Archive, 2023, 10(01), 1062–1068.
Article DOI: 10.30574/ijsra.2023.10.1.1127
 
Publication history: 
Received on 17 September 2023; revised on 25 October 2023; accepted on 28 October 2023
 
Abstract: 
It starts with a case review of the special characteristics of the cloud computing threat and vulnerability, such as data leakage, inside threats, shared resources vulnerabilities. A review of the literature on current models and tools for managing these risks, including the most relevant studies as well as Good Practice Guidelines. The book addresses how traditional security models need to be adapted for the cloud and outlines the efficacy of various security technologies - including encryption, IAM (identity and access management), and IDS, the work presented a reliable risk management framework for cloud-based environments, centering on multi-level security. This includes advanced encryption schemes, live monitoring &automated remediation, response mechanisms. The framework also includes best practices for compliance with regulatory standards and data privacy and protection strategies. Early results of use when implemented in a trial project proved it effective in reducing the security incidents as well as in strengthening the overall system resilience. This paper ends with what these findings imply for future cloud security practices and a look at how organizations can better secure their cloud environment.
 
Keywords: 
Cloud Computing; Data Protection; Encryption; Intrusion Detection Systems (IDS); Data Privacy; Risk Management.
 
Full text article in PDF: