Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation
Keywords:
CLoud, computing, multi cloud computing, hybrid cloud, Zero TrustAbstract
This study reviews the opportunities and challenges of implementing Multi-Cloud and Hybrid Cloud models that focus on security and data management. Multi-Cloud implementation offers flexibility, but also brings challenges related to security and privacy. Data security in multi-cloud can be improved by implementing encryption such as Homomorphic Encryption and Hybrid Crypto which combines DES and RSA algorithms. The Hybrid Cloud model allows integration between public and private clouds. where the implementation of Zero Trus can improve the security of the cloud network. The results of this Literature Review emphasize the importance of security policies at every layer of the cloud from infrastructure to applications. this is done to protect sensitive data in the cloud environment. of course, the right strategy is needed in cloud data management so that the implementation of cloud computing is more effective
Downloads
References
M. Attaran, “Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance,” J. Int. Technol. Inf. Manag., vol. 26, no. 1, pp. 112–137, Jan. 2017, doi: 10.58729/1941-6679.1283.
A. Panteli, “Examining Poly-Cloud in Enterprise Cloud Strategies : Differentiating Between Multi-Cloud and Hybrid Cloud Approaches,” vol. 13, no. 1, pp. 22308849012023–02, 2023.
S. Shrivastava and Y. Agrawal, “Multi-Cloud Deployments and Hybrid Cloud Architecture,” Resmilitaris, vol. 10, no. 1, pp. 4754–4760, 2024, doi: 10.48047/resmil.v10i1.16.
D. Zeginis et al., “A user-centric multi-paas application management solution for hybrid multi-cloud scenarios,” Scalable Comput., vol. 14, no. 1, pp. 17–32, 2013, doi: 10.12694/scpe.v14i1.824.
A. J. Ferrer, D. G. Pérez, and R. S. González, “Multi-cloud Platform-as-a-service Model, Functionalities and Approaches,” Procedia Comput. Sci., vol. 97, pp. 63–72, 2016, doi: 10.1016/j.procs.2016.08.281.
N. Mohammad, “Multi-Cloud Environments : a Comprehensive Study on Encryption Techniques and Access Control,” no. April, 2024.
A. R. Anggoro, “Studi Mengenai Fully Homomorphic Encryption dan Perkembangannya dari RSA sebagai Enkripsi Homomorfis Populer,” 2018.
O. Zibouh, A. Dalli, and H. Drissi, “Cloud computing security through parallelizing fully Homomorphic encryption applied to multi-cloud approach,” J. Theor. Appl. Inf. Technol., vol. 87, no. 2, pp. 300–307, 2016.
H. H. Naqvi, T. Alyas, N. Tabassum, U. Farooq, and A. Namoun, “Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 10, no. 3, pp. 2533–2539, 2021, doi: 10.30534/ijatcse/2021/1451032021.
J. Flanigan, “Zero Trust Network Model,” pp. 1–7, 2018, [Online]. Available: https://www.cs.tufts.edu/comp/116/archive/fall2018/jflanigan.pdf
V. N. S. S. Chimakurthi, “The Challenge of Achieving Zero Trust Remote Access in Multi-Cloud Environment,” ABC J. Adv. Res., vol. 9, no. 2, pp. 89–102, 2020, doi: 10.18034/abcjar.v9i2.608.
S. Achar, “Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape,” World Acad. Sci. Eng. Technol. Int. J. Comput. Syst. Eng., vol. 16, no. 9, pp. 379–384, 2022, doi: 10.5281/zenodo.7084251.
K. Subramanian and F. L. John, “Dynamic and secure unstructured data sharing in multi-cloud storage using the hybrid crypto-system,” Int. J. Adv. Appl. Sci., vol. 5, no. 1, pp. 15–23, 2018, doi: 10.21833/ijaas.2018.01.003.
K. Subramanian and F. L. John, “Secure and Reliable Unstructured Data Sharing in Multi-Cloud Storage using the Hybrid Crypto System,” vol. 17, no. 6, pp. 196–206, 2017.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Wigananda Firdaus, Anjik Sukmaaji
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.