Evaluation of Cloud-Based Cyber Security System

Main Article Content

Ananda Ravuri, Raghu Kumar Lingamallu, S Arvind, P. Srinivasa Rao, Veeraswamy Ammisetty

Abstract

Cloud-based cyber security systems leverage the power of cloud computing to protect digital assets from cyber threats. By utilizing remote servers and advanced algorithms, these systems provide real-time monitoring, threat detection, and incident response. They offer scalable solutions, enabling businesses to adapt to evolving threats and handle increasing data volumes. Cloud-based security systems provide benefits such as reduced infrastructure costs, continuous updates and patches, centralized management, and global threat intelligence. They protect against various attacks, including malware, phishing, DDoS, and unauthorized access. With their flexibility, reliability, and ease of deployment, cloud-based cyber security systems are becoming essential for organizations seeking robust protection in today's interconnected digital landscape. The research significance of cloud-based cyber security systems lies in their ability to address the growing complexity and scale of cyber threats in today's digital landscape. By leveraging cloud computing, these systems offer several key advantages for researchers and organizations: Scalability: Cloud-based systems can scale resources on-demand, allowing researchers to handle large volumes of data and analyze complex threat patterns effectively. Cost-efficiency: The cloud eliminates the need for extensive on-premises infrastructure, reducing costs associated with hardware, maintenance, and upgrades. Researchers can allocate resources based on their needs, optimizing cost-effectiveness. Real-time monitoring and threat detection: Cloud-based systems provide real-time monitoring of network traffic, enabling quick identification of suspicious activities and potential threats. Researchers can leverage advanced analytics and machine learning algorithms to enhance threat detection capabilities. Collaboration and knowledge sharing: Cloud platforms facilitate collaboration among researchers and organizations by enabling the sharing of threat intelligence, best practices, and research findings. Compliance and regulatory requirements: Cloud platforms often offer built-in compliance features and tools to meet regulatory requirements, assisting researchers in adhering to data protection and privacy standards. Overall, the research significance of cloud-based cyber security systems lies in their ability to provide scalable, cost-effective, and advanced security capabilities, empowering researchers to mitigate evolving cyber threats and protect sensitive data and systems effectively. We will be using Weighted Product Methodology (WPM) which is a decision-making technique that assigns weights to various criteria and ranks alternatives based on their weighted scores. It involves multiplying the ratings of each criterion by their corresponding weights and summing them up to determine the overall score. This method helps prioritize options and make informed decisions in complex situations. Taken of Operational, Technological, Organizational Recorded Electronic Delivery, Recorded Electronic Deliver, Blockchain technology, Database security, Software updates, Antivirus and antimalware The Organizational cyber security measures comes in last place, while Technological cyber security measures is ranked top and Operational measures comes in between the above two in second place. In conclusion, a cloud-based cyber security system revolutionizes the way organizations safeguard their digital assets. By utilizing remote servers, advanced algorithms, and real-time monitoring, it offers scalable and robust protection against evolving threats. With features like threat detection, data encryption, and centralized management, it ensures enhanced security, agility, and efficiency. Embracing a cloud-based approach empowers organizations to stay ahead in the ever-changing landscape of cyber security, effectively safeguarding their critical data and infrastructure.

Article Details

How to Cite
Ananda Ravuri, et al. (2023). Evaluation of Cloud-Based Cyber Security System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 1723–1730. https://doi.org/10.17762/ijritcc.v11i10.8747
Section
Articles
Author Biography

Ananda Ravuri, Raghu Kumar Lingamallu, S Arvind, P. Srinivasa Rao, Veeraswamy Ammisetty

Ananda Ravuri1, Dr. Raghu Kumar Lingamallu2, Dr. S Arvind3, Dr. P. Srinivasa Rao4, Veeraswamy Ammisetty5
1Senior Software Engineer Intel corporationHillsboro, Oregon 97124 USA

Mail : Ananda.ravuri@intel.com , ananda.ravuri@gmail.com

2Assistant  Professor Department of CSE, KG Reddy College of Engineering and Technology, Chilkur Village,Hyderabad -  501504

Mail : lrgupta528@gmail.com

3 Professor, Department of Computer Science Engineering Hyderabad Institute of Technology and Management Mail : scarvi@rediffmail.com

4Associate Professor Department of Computer Science & Engineering  Vaasireddy    Venkatadri Institute of Technology, Namburu, Guntur  Mail: psr.srinivas999@gmail.com

5Associate Professor, Department of Computer Science & Engineering, Koneru  Lakshmaiah Education Foundation, Vaddeswaram, Guntur Andhra Pradesh, India.

Mail: ammisetty.veeraswamy@gmail.com