Enterprise Cloud Architecture for Data Security and Compliance: Building Privacy-Centric Cloud Solutions for Global Enterprises

Authors

  • Yeswanth Surampudi Beyond Finance, USA Author
  • Manish Tomar Citibank, USA Author
  • Rama Krishna Inampudi Independent Researcher, Mexico Author

Keywords:

enterprise cloud architecture, data security

Abstract

Data storage, processing, and accessibility have altered for worldwide organizations due to cloud demand. Complex regional data protection laws hamper cloud data privacy and compliance. The paper examines multinationals' privacy- and compliance-focused corporate cloud infrastructure. The report states that global data transfers and compliance need a full cloud data security architecture to protect data and regulatory obligations. Enterprise cloud infrastructures comply with worldwide data security laws via encryption, IAM, monitoring, and auditing. 

Designing private commercial clouds. Cloud infrastructures need data localization and jurisdiction-specific limits as data residency and sovereignty grow. Studying cloud storage and processing zones and geo-fencing to restrict data flow. Distributed cloud data security research emphasizes key management and rest-and-transit encryption. Business cloud data protection studies include end-to-end, secure enclave, and homomorphic encryption. 

References

A. Singh and K. C. Santosh, "Cloud computing security issues and challenges: A survey," International Journal of Computer Applications, vol. 68, no. 11, pp. 20-26, Apr. 2013.

M. K. Gupta, S. Jain, and R. Garg, "Privacy-preserving cloud computing: Challenges and solutions," Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, pp. 436-443, 2017.

M. Mell and T. Grance, "The NIST definition of cloud computing," NIST Special Publication 800-145, National Institute of Standards and Technology, 2011.

K. Chatzikokolakis, D. Park, M. Kalloniatis, and S. D. Samohyl, "Privacy-preserving cloud computing: A comprehensive survey," IEEE Transactions on Cloud Computing, vol. 9, no. 3, pp. 852-865, 2021.

L. Xu, J. Li, Z. Wu, and K. Ren, "Cloud computing security issues and challenges: A survey," Proceedings of the IEEE International Conference on Computer Science and Engineering, pp. 355-360, 2009.

Tamanampudi, Venkata Mohit. "A Data-Driven Approach to Incident Management: Enhancing DevOps Operations with Machine Learning-Based Root Cause Analysis." Distributed Learning and Broad Applications in Scientific Research 6 (2020): 419-466.

Tamanampudi, Venkata Mohit. "Leveraging Machine Learning for Dynamic Resource Allocation in DevOps: A Scalable Approach to Managing Microservices Architectures." Journal of Science & Technology 1.1 (2020): 709-748.

R. K. Reddy and R. G. L. Babu, "Security issues in cloud computing: A survey," International Journal of Computer Applications, vol. 57, no. 13, pp. 42-45, Nov. 2012.

A. F. Kueh, R. H. Khusainov, and D. S. Koscheev, "Security and privacy challenges in cloud computing," IEEE Access, vol. 7, pp. 10801-10819, 2019.

S. M. Shah, A. S. Aghdami, and J. G. Rainer, "Homomorphic encryption in cloud computing: A survey," International Journal of Computer Applications, vol. 92, no. 15, pp. 34-41, 2014.

X. Zhang, Y. Xiao, and Z. Li, "A survey on privacy-preserving techniques in cloud computing," IEEE Transactions on Cloud Computing, vol. 6, no. 3, pp. 779-793, Jul.-Sept. 2018.

R. A. Popa, C. R. Burns, and H. Shacham, "Privacy-preserving cloud computing," IEEE Security & Privacy, vol. 11, no. 4, pp. 36-45, 2013.

M. Armbrust, A. Fox, R. Griffith, and A. D. Joseph, "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.

P. Mell and S. Grance, "The NIST definition of cloud computing," NIST Special Publication, vol. 800-145, 2011.

M. He, L. Wang, and Y. Shi, "Secure and privacy-preserving cloud computing," Proceedings of the International Conference on Security and Privacy in Communication Networks, pp. 213-220, 2011.

Z. Y. Aung and S. U. Aung, "A study on multi-factor authentication for cloud security," International Journal of Computer Science and Information Security, vol. 10, no. 5, pp. 55-60, May 2012.

P. B. Gupta, S. K. Soni, and R. Gupta, "Blockchain for cloud computing security: An in-depth survey," IEEE Access, vol. 8, pp. 115948-115965, 2020.

K. R. Sundararajan and L. Lee, "Role-based access control in cloud computing: An overview," IEEE Transactions on Cloud Computing, vol. 5, no. 2, pp. 1-10, Apr.-Jun. 2017.

M. N. Yadav, "Federated learning for privacy-preserving cloud applications," IEEE Transactions on Cloud Computing, vol. 11, no. 4, pp. 1-10, Oct.-Dec. 2020.

N. S. Kumar and S. R. Raja, "Comparative analysis of cloud encryption techniques: A survey," International Journal of Computer Applications, vol. 28, no. 6, pp. 34-39, 2017.

M. Khalil and M. Khajeh, "Compliance requirements in cloud computing: A survey," International Journal of Cloud Computing and Services Science, vol. 6, no. 1, pp. 11-20, 2017.

D. Wang, "Towards secure cloud storage: A survey on data encryption and access control," IEEE Transactions on Cloud Computing, vol. 7, no. 2, pp. 1-11, 2019.

Downloads

Published

09-11-2022

How to Cite

[1]
Yeswanth Surampudi, Manish Tomar, and Rama Krishna Inampudi, “Enterprise Cloud Architecture for Data Security and Compliance: Building Privacy-Centric Cloud Solutions for Global Enterprises”, Cybersecurity & Net. Def. Research, vol. 2, no. 2, pp. 1–44, Nov. 2022, Accessed: Apr. 29, 2025. [Online]. Available: https://tsbpublisher.org/cndr/article/view/45