Data security and governance in multi-cloud computing environment

Journal article


Yeboah-Ofori, Abel, Jafar, Alameen, Abisogun, Toluwaloju, Hilton, Ian, Oseni, Waheed and Musa, Ahmad 2024. Data security and governance in multi-cloud computing environment. 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). pp. 215-222. https://doi.org/10.1109/ficloud62933.2024.00040
AuthorsYeboah-Ofori, Abel, Jafar, Alameen, Abisogun, Toluwaloju, Hilton, Ian, Oseni, Waheed and Musa, Ahmad
Abstract

The adoption and integration of a multi-cloud computing environment for data transmission and storage is a crucial step for organizations, offering optimization, redundancy, and increased accessibility. However, this transition has also brought about significant security challenges, vulnerabilities, and attack vectors. These include inefficient resource management across diverse cloud providers, interoperability issues, identity and access management concerns, unauthorized access, data governance, and operational optimization. These challenges have led to various types of attacks, such as supply chain attacks, data breaches, DoS, APTs, and cross-cloud attacks. This paper delves into the growing complexities of securing multi-cloud environments, specifically focusing on governance and security implications. It also evaluates the effectiveness of multi-cloud management tools, such as Azure Arc and Google Anthos, in addressing these challenges. The contribution of this paper is threefold. First, we thoroughly investigate the various multi-cloud data storage mechanisms, vulnerabilities, and attacks. Secondly, we compare three prominent multi-cloud management tools, Azure Arc, Google Anthos, and AWS Elastic Kubernetes Service (EKS), regarding their ability to secure resources across diverse cloud providers. Finally, we conduct an attack on the multi-cloud platform to detect vulnerabilities and operational inefficiencies and propose security mechanisms to enhance security. Our results demonstrate how data security and governance can be effectively implemented to secure multi-cloud operation environments and how inefficiencies can be detected and addressed to ensure data security.

KeywordsCloud computing; Cyber security
Year2024
Journal2024 11th International Conference on Future Internet of Things and Cloud (FiCloud)
Journal citationpp. 215-222
PublisherIEEE
ISSN2996-1017
Digital Object Identifier (DOI)https://doi.org/10.1109/ficloud62933.2024.00040
Official URLhttps://ieeexplore.ieee.org/document/10743006
Publication dates
Print19 Aug 2024
Publication process dates
Deposited18 Nov 2024
Accepted author manuscript
License
File Access Level
Open
Output statusPublished
Additional information

Publications router.

Permalink -

https://repository.canterbury.ac.uk/item/99q26/data-security-and-governance-in-multi-cloud-computing-environment

Download files


Accepted author manuscript
  • 0
    total views
  • 7
    total downloads
  • 0
    views this month
  • 5
    downloads this month

Export as

Related outputs

Comprehensive analysis of security issues in cloud-based Internet of Things: A survey
Gimba, U. A., Ariffrin, N. A. M., Musa, A. and Babangida, L. 2023. Comprehensive analysis of security issues in cloud-based Internet of Things: A survey. Journal of Computer Science & Computational Mathematics. 13 (2). https://doi.org/10.20967/jcscm.2023.02.004
Functional and performance analysis of discrete event network simulation tools
Musa, A. and Awan, I. 2022. Functional and performance analysis of discrete event network simulation tools. Simulation Modelling Practice and Theory. 116, p. 102470. https://doi.org/10.1016/j.simpat.2021.102470
The case for validating ADDIE model as a digital forensic model for peer to peer network investigation
Musa, A., Awan, I-U and Zarah, F. 2022. The case for validating ADDIE model as a digital forensic model for peer to peer network investigation. Information System Frontiers. https://doi.org/10.1007/s10796-022-10360-8
Machine learning for intrusion detection and network performance
Ibrahim Abobaker and Ahmad Musa 2021. Machine learning for intrusion detection and network performance. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation
Ahmad Musa, Irfan-Ullah Awan and Ibrahim Abobaker 2021. Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE.
Self regulated learning in flipped classrooms: A systematic literature review
Rasheed Abubakar Rasheed, Amirrudin Kamsin, Nor Aniza Abdullah, Habeebah Adamu Kakudi, Auwal Shehu Ali, Ahmad Musa and Adamu Sani Yahaya 2020. Self regulated learning in flipped classrooms: A systematic literature review. International Journal of Information and Education Technology. 10 (11). https://doi.org/10.18178/ijiet.2020.10.11.1469
An investigation into peer-to-peer network security using Wireshark
Ahmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed 2019. An investigation into peer-to-peer network security using Wireshark. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.
Transfer learning based histopathologic image classification for burns recognition
Aliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa 2019. Transfer learning based histopathologic image classification for burns recognition. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.