Secure, Scalable and Privacy Aware Data Strategy in Cloud
- URL: http://arxiv.org/abs/2509.13627v1
- Date: Wed, 17 Sep 2025 01:56:07 GMT
- Title: Secure, Scalable and Privacy Aware Data Strategy in Cloud
- Authors: Vijay Kumar Butte, Sujata Butte,
- Abstract summary: This paper develops an effective enterprise data strategy in the cloud.<n>Various components of an effective data strategy are discussed and architectures addressing security, scalability and privacy aspects are provided.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The enterprises today are faced with the tough challenge of processing, storing large amounts of data in a secure, scalable manner and enabling decision makers to make quick, informed data driven decisions. This paper addresses this challenge and develops an effective enterprise data strategy in the cloud. Various components of an effective data strategy are discussed and architectures addressing security, scalability and privacy aspects are provided.
Related papers
- Confidential Computing for Cloud Security: Exploring Hardware based Encryption Using Trusted Execution Environments [0.0]
Cloud computing has created a huge challenge of security, especially in terms of safeguarding sensitive data.<n>In response to this problem, Confidential Computing has been a tool seeking to secure data in processing by usage of hardware-based Trusted Execution Environments (TEEs)
arXiv Detail & Related papers (2025-11-06T17:03:33Z) - An End to End Edge to Cloud Data and Analytics Strategy [0.0]
This paper provides an end to end secure edge to cloud data and analytics strategy.<n>To enable real life implementation, the paper provides reference architectures for device layer, edge layer and cloud layer.
arXiv Detail & Related papers (2025-09-15T16:04:10Z) - On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions [1.7056096558557128]
Federated Learning (FL) is an emerging distributed machine learning paradigm enabling clients to train a global model collaboratively without sharing their raw data.<n>While FL enhances data privacy by design, it remains vulnerable to various security and privacy threats.<n>Security-enhancing methods aim to improve FL robustness against malicious behaviors such as byzantine attacks, poisoning, and Sybil attacks.<n>Privacy-preserving techniques focus on protecting sensitive data through cryptographic approaches, differential privacy, and secure aggregation.
arXiv Detail & Related papers (2025-08-19T11:06:20Z) - Trustworthy Federated Learning: Privacy, Security, and Beyond [37.495790989584584]
Federated Learning (FL) addresses concerns by facilitating collaborative model training across distributed data sources without transferring raw data.
We conduct an extensive survey of the security and privacy issues prevalent in FL, underscoring the vulnerability of communication links and the potential for cyber threats.
We identify the intricate security challenges that arise within the FL frameworks, aiming to contribute to the development of secure and efficient FL systems.
arXiv Detail & Related papers (2024-11-03T14:18:01Z) - A Federated Learning Platform as a Service for Advancing Stroke Management in European Clinical Centers [37.285731240749904]
This paper introduces a novel Federated Learning (FL) platform designed to support the configuration, monitoring, and management of FL processes.
Considering the production sensitivity inherent in clinical environments, we emphasize the security of the proposed FL architecture.
The platform has been successfully tested in various operational environments using a publicly available dataset.
arXiv Detail & Related papers (2024-10-02T09:24:05Z) - Prichain II: CloudGuardian Cloud Security Proposal with Blockchain [0.0]
Between 2022 and 2023, there has been an increase of around 48% in cloud security threats.
We propose integrating the network's blockchain technology with a database located in the cloud.
arXiv Detail & Related papers (2024-07-29T12:52:27Z) - Navigating the Data Trading Crossroads: An Interdisciplinary Survey [33.64953318642493]
Data has been increasingly recognized as a critical factor in the future economy.
However, constructing an efficient data trading market faces challenges such as privacy breaches, data monopolies, and misuse.
This paper aims to identify existing problems, research gaps, and propose potential solutions.
arXiv Detail & Related papers (2024-07-16T08:07:16Z) - DataFreeShield: Defending Adversarial Attacks without Training Data [32.29186953320468]
We investigate the problem of data-free adversarial robustness, where we try to achieve robustness without accessing real data.
We propose DataFreeShield, which tackles the problem from two perspectives: surrogate dataset generation and adversarial training.
We show that DataFreeShield outperforms baselines, demonstrating that the proposed method sets the first entirely data-free solution for the adversarial robustness problem.
arXiv Detail & Related papers (2024-06-21T20:24:03Z) - On the Challenges of Creating Datasets for Analyzing Commercial Sex Advertisements to Assess Human Trafficking Risk and Organized Activity [37.47883671323525]
This study addresses the challenges of building datasets to understand the risks associated with organized activities and human trafficking through commercial sex advertisements.
Traditional approaches, which are not automated and are difficult to reproduce, fall short in addressing these issues.
We have developed a reproducible and automated methodology to analyze five million advertisements.
arXiv Detail & Related papers (2024-05-22T05:10:13Z) - Cloud Security Assurance: Strategies for Encryption in Digital Forensic Readiness [0.0]
This paper explores strategies for enhancing cloud security through encryption and digital forensic readiness.
Various encryption techniques and key management practices are discussed, along with their implications for data privacy and regulatory compliance.
arXiv Detail & Related papers (2024-03-04T15:39:42Z) - Securing Data Platforms: Strategic Masking Techniques for Privacy and
Security for B2B Enterprise Data [0.0]
Business-to-business (B2B) enterprises are increasingly constructing data platforms.
It has become critical to design these data platforms with mechanisms that inherently support data privacy and security.
Data masking stands out as a vital feature of data platform architecture.
arXiv Detail & Related papers (2023-12-06T05:04:37Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.