Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
  • Past Issues

Analysis on addressing the threats to cloud computing on the basis of security safeguards for sap cloud services

Breadcrumb

  • Home
  • Analysis on addressing the threats to cloud computing on the basis of security safeguards for sap cloud services

Vedaprada Raghunath *

IT Director, IMR soft LLC, USA.

Review Article
 

World Journal of Advanced Research and Reviews, 2024, 23(03), 2539–2548
Article DOI: 10.30574/wjarr.2024.23.3.2912
DOI url: https://doi.org/10.30574/wjarr.2024.23.3.2912

Received on 14 August 2024; revised on 24 September 2024; accepted on 26 September 2024

Cloud computing has become an integral part of combination/multi-cloud infrastructures due to its many benefits, including quick deployment, flexibility, cheap costs, and scalability, which have attracted businesses of all sizes. New possibilities and threats in terms of security flaws are cropping up in this field, even if cloud storage provides substantial advantages and inexpensive choices for IT administration and growth. When we talk about safeguarding cloud infrastructure systems, we're referring to a set of rules, regulations, and systematic procedures. This is also known as cloud computing security. The purpose of implementing these security measures is to safeguard cloud-based data, facilitate the enforcement of legislation, ensure the privacy of consumer information, and set standards for encryption in specific devices and applications. Modern cloud computing and security concerns throughout the cloud's many layers are addressed in this study. Within this context, the current study would make a substantial contribution to lowering the frequency of security breaches in cloud computing, paving the way for the continued provision of safe and reliable services. Storage of databases on the cloud is expanding rapidly in the IT industry, including SAP networks. Because enterprises are ultimately responsible for the security of their data, migrating databases to cloud computing environments brings with it a plethora of security risks. To guarantee data integrity, availability, and secrecy, appropriate security measures should be put in place before a company migrates its sensitive data to the cloud. When data is at rest, it is most vulnerable to unauthorized access; when it is in transit, it must be subject to strict supervision.

Cloud computing; Cloud security; Cloud security issues; Security attacks; Intrusion

https://wjarr.co.in/sites/default/files/fulltext_pdf/WJARR-2024-2912.pdf

Get Your e Certificate of Publication using below link

Download Certificate

Vedaprada Raghunath. Analysis on addressing the threats to cloud computing on the basis of security safeguards for sap cloud services. World Journal of Advanced Research and Reviews, 2024, 23(03), 2539–2548.  Article DOI: https://doi.org/10.30574/wjarr.2024.23.3.2912

Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0

Footer menu

  • Contact

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution