Analysis on addressing the threats to cloud computing on the basis of security safeguards for sap cloud services
IT Director, IMR soft LLC, USA.
Review Article
World Journal of Advanced Research and Reviews, 2024, 23(03), 2539–2548
Publication history:
Received on 14 August 2024; revised on 24 September 2024; accepted on 26 September 2024
Abstract:
Cloud computing has become an integral part of combination/multi-cloud infrastructures due to its many benefits, including quick deployment, flexibility, cheap costs, and scalability, which have attracted businesses of all sizes. New possibilities and threats in terms of security flaws are cropping up in this field, even if cloud storage provides substantial advantages and inexpensive choices for IT administration and growth. When we talk about safeguarding cloud infrastructure systems, we're referring to a set of rules, regulations, and systematic procedures. This is also known as cloud computing security. The purpose of implementing these security measures is to safeguard cloud-based data, facilitate the enforcement of legislation, ensure the privacy of consumer information, and set standards for encryption in specific devices and applications. Modern cloud computing and security concerns throughout the cloud's many layers are addressed in this study. Within this context, the current study would make a substantial contribution to lowering the frequency of security breaches in cloud computing, paving the way for the continued provision of safe and reliable services. Storage of databases on the cloud is expanding rapidly in the IT industry, including SAP networks. Because enterprises are ultimately responsible for the security of their data, migrating databases to cloud computing environments brings with it a plethora of security risks. To guarantee data integrity, availability, and secrecy, appropriate security measures should be put in place before a company migrates its sensitive data to the cloud. When data is at rest, it is most vulnerable to unauthorized access; when it is in transit, it must be subject to strict supervision.
Keywords:
Cloud computing; Cloud security; Cloud security issues; Security attacks; Intrusion
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0