International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
E-ISSN: 2349-7300Impact Factor - 9.907

A Widely Indexed Open Access Peer Reviewed Online Scholarly International Journal

Call for Paper Volume 13 Issue 2 March-April 2025 Submit your research for publication

Cybersecurity: Handling Sensitive Data in Cloud Architecture

Authors: Binoy Kurikaparambil Revi

DOI: https://doi.org/10.5281/zenodo.14951108

Short DOI: https://doi.org/g86q4c

Country: USA

Full-text Research PDF File:   View   |   Download


Abstract: Before the advancement of cloud applications and cloud storage, sensitive data were stored on isolated systems or servers in encrypted formats. These systems were typically disconnected from external networks and had restricted access. Additionally, a mitigation plan was often implemented to recover data in the event of catastrophic damage. The management of data storage, maintenance, recovery plans, and access control required significant capital investment and ongoing expenses. With modern cloud services, businesses leverage a more secure infrastructure that data centers provide in terms of encryption, security, and access management. Additionally, the recovery plan is now just a matter of a few clicks. While these features and security measures provide many benefits, one significant risk for users and businesses is that any cloud services or data transactions initiated by a user rely on the internet, which means the data is exchanged online. Businesses and users need to design and implement secure data management for handling data related to application use or storage. In various fields, such as medical devices, there are specific standards that dictate who has access to the data and who does not. These standards also define the necessary level of encryption required for data storage. This article explains the risks that are associated with secure data management in a typical cloud application and strategies to safeguard data in domains that handle sensitive data. Data security is highly critical in most applications available today. Cloud services provide all the necessary tools to businesses and users, and it is up to them to utilize these resources wisely and correctly.

Keywords: Cybersecurity, Cloud Security, Data Encryption, Data Transfer, Cloud Apps


Paper Id: 232195

Published On: 2021-12-06

Published In: Volume 9, Issue 6, November-December 2021

Share this