Author
Listed:
- Harish Narne
- Sandip Dholakia
Abstract
Purpose: This paper proposes an adaptive security model designed for cloud platforms, integrating information security principles and cryptographic protocols to address evolving cybersecurity threats. The model ensures dynamic security control adjustments based on real-time risk assessments to protect enterprise applications and business operations. Methodology: The proposed model employs continuous monitoring, intelligent threat detection, and automated responses to proactively mitigate risks. It integrates cryptographic techniques such as AES, RSA, and elliptic-curve cryptography to secure data transmission, storage, and access control. Additionally, machine learning-driven anomaly detection and behavioral analytics dynamically refine security policies. Findings: The model enhances cloud security resilience against data breaches, unauthorized access, and service disruptions. By leveraging automated security orchestration, it ensures scalability, resilience, and operational efficiency while minimizing system overhead. The experimental implementation confirms its effectiveness in mitigating threats while maintaining high system performance and availability. Unique Contribution to Theory, Practice, and Policy (Recommendations): This research contributes to cloud security advancements by presenting a comprehensive, adaptable security framework that addresses both known and emerging attack vectors. It ensures compliance with industry regulations such as GDPR, HIPAA, and SOC 2, providing organizations with a structured approach to meeting evolving cybersecurity mandates. Future research should explore enhanced AI-driven security orchestration, quantum-resistant cryptographic protocols, and cross-cloud security interoperability to further fortify cloud infrastructures.
Suggested Citation
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojijce:v:7:y:2025:i:2:p:10-20:id:2591. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/IJCE/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.