Citation:
Noah Green, Syed Ali Fathima, "Securing Hybrid Cloud Data Backups: Best Practices For Encryption, Access Control, and Compliance" International Journal of Multidisciplinary on Science and Management, pp. 76-85, 2024.
Abstract:
Data security has become a critical concern for organizations leveraging hybrid cloud architectures. The rapid adoption of hybrid cloud environments has introduced challenges in ensuring data backup security, necessitating robust encryption, stringent access control, and adherence to compliance standards. This paper explores best practices for securing hybrid cloud data backups, focusing on encryption mechanisms, identity and access management, and regulatory compliance. By analyzing industry standards and technological advancements, this study provides a comprehensive framework for mitigating security risks associated with hybrid cloud storage. The paper includes a literature survey of existing security methodologies, a detailed methodology for implementing security measures, and an evaluation of results. Additionally, a comparative analysis of encryption algorithms, an access control framework, and a compliance checklist are provided to guide organizations in implementing effective data protection strategies.
Keywords:
Hybrid Cloud, Data Backup, Encryption, Access Control, Compliance, Cybersecurity, Data Protection, Cloud Security.
References:
1. Amin, S., & Patra, A. (2020). Security analysis of home routers and their firmware. International Journal of Computer Applications, 176(3), 1-8. https://doi.org/10.5120/ijca2020918872
2. Moolchandani, S., (2024). The Integration of Generative AI in Credit Risk Management. Journal Homepage: http://www.ijmra.us, 14(02).
3. G. Pandy, V. J. Pugazhenthi, and A. Murugan, "Advances in Software Testing in 2024: Experimental Insights, Frameworks, and Future Directions," International Journal of Advanced Research in Computer and Communication Engineering, vol. 13, no. 11, pp. 40–50, Nov. 2024. DOI: 10.17148/IJARCCE.2024.131103.
4. Sanjay Moolchandani. Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights, International Journal of Computer Science & Information Technology (IJCSIT) Vol 16, No 3, June 2024. DOI: 10.5121/ijcsit.2024.16306-67.
5. Alonso, A., Alcaraz, C., & Lopez, J. (2019). Security challenges in Internet of Things (IoT) home routers. Journal of Cybersecurity and Privacy, 1(2), 118-134. https://doi.org/10.1002/cp2.45
6. Suman Chintala, "Boost Call Center Operations: Google's Speech-to-Text AI Integration," International Journal of Computer Trends and Technology, vol. 72, no. 7, pp.83-86, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I7P110
7. G. Pandy, V. G. Pugazhenthi, and J. K. Chinnathambi, "Real Value of Automation in the Healthcare Industry," European Journal of Computer Science and Information Technology, vol. 12, no. 9, Nov. 2024, doi: 10.37745/ejcsit.2013/vol12n919.
8. Barker, M., & Rajab, M. (2017). Exploiting IoT devices through insecure home routers: A case study of the Mirai botnet. Journal of Information Security, 8(4), 256-270. https://doi.org/10.1109/JIS.2017.8320843
9. Pandy G., Jayaram V., Krishnappa M.S., Ingole B.S., Ganeeb K.K., and Joseph S. (2024) Advancements in Robotics Process Automation: A Novel Model with Enhanced Empirical Validation and Theoretical Insights, European Journal of Computer Science and Information Technology, 12 (5), 64-73
10. Chintala, Suman. (2024). Emotion AI in Business Intelligence: Understanding Customer Sentiments and Behaviors. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY E-ISSN. 06. 8.
11. Chun, D., & Lee, H. (2021). Firmware security analysis of consumer-grade routers: A comprehensive approach. IEEE Transactions on Network and Service Management, 18(3), 2215-2230. https://doi.org/10.1109/TNSM.2021.3101103
12. Essential Cybersecurity Measures for Databases to Mitigate Cyber Attacks - Balakrishna Boddu - IJIRMPS Volume 11, Issue 6, November-December 2023. DOI 10.5281/zenodo.14059338.
13. Gokul Ramadoss, 2022, “Data Visualization in Health Care: Risks And Rewards”, Journal of Artificial Intelligence, machine Learning and Data science, Volume 1, Issue 1, PP 1085-1088.
14. Suman Chintala, "Strategic Forecasting: AI-Powered BI Techniques", International Journal of Science and Research (IJSR), Volume 13 Issue 8, August 2024, pp. 557-563, https://www.ijsr.net/getabstract.php?paperid=SR24803092145, DOI: https://www.doi.org/10.21275/SR24803092145
15. Dube, R., & Saini, D. (2020). Firmware vulnerability in home routers: A review of risks and mitigations. International Journal of Computer Science and Engineering, 12(6), 243-257. https://doi.org/10.1016/j.cose.2020.101813
16. Balakrishna Boddu. SCALING DATA PROCESSING WITH AMAZON REDSHIFT DBA BEST PRACTICES FOR HEAVY LOADS, International Journal of Core Engineering & Management, Volume-7, Issue-07, 2023.
17. Fraser, L., & Smith, P. (2018). Securing home routers against remote attacks: A review of techniques and strategies. Computers & Security, 74, 80-91. https://doi.org/10.1016/j.cose.2017.12.008
18. Empowering Rules Engines: AI and ML Enhancements in BRMS for Agile Business Strategies. (2022). International Journal of Sustainable Development through AI, ML and IoT, 1(2), 1-20. https://ijsdai.com/index.php/IJSDAI/article/view/36
19. S. K. Suvvari, "The impact of agile on customer satisfaction and business value," Innov. Res. Thoughts, vol. 6, no. 5, pp. 199–211, 2020.
20. S. K. Suvvari, "An exploration of agile scaling frameworks: Scaled agile framework (SAFe), large-scale scrum (LeSS), and disciplined agile delivery (DAD)," Int. J. Recent Innov. Trends Comput. Commun., vol. 7, no. 12, pp. 9–17, 2019.
21. Sanodia, G. (2024). Revolutionizing Cloud Modernization through AI Integration. Turkish Journal of Computer and Mathematics Education, 15(2), 266-283.
22. Gupta, S., & Wang, W. (2019). Exploitability of common router vulnerabilities and the role of firmware updates in mitigating risks. Journal of Information Privacy and Security, 15(4), 241-256. https://doi.org/10.1080/15536548.2019.1666768
23. Sanodia, G. (2024). Enhancing CRM Systems with AI-Driven Data Analytics for Financial Services. Turkish Journal of Computer and Mathematics Education, 15(2), 247-265.
24. Roch, M., & Toth, C. (2020). IoT vulnerabilities in home routers: A case study of smart home devices and security implications. International Conference on Cybersecurity and Communications Systems, 3, 45-53. https://doi.org/10.1109/CyberSecCom.2020.00012
25. S. K. Suvvari, "Project portfolio management: Best practices for strategic alignment," Innov. Res. Thoughts, vol. 8, no. 4, pp. 372–385, 2022.
26. Gokul Ramadoss, "Leveraging AI in ETL / ELT Designs for Enhanced Health Risk Assessment", International Journal of Science and Research (IJSR), Volume 13 Issue 8, August 2024, pp. 262-265, https://www.ijsr.net/getabstract.php?paperid=SR24802003019
27. Siddiqui, M., & Naqvi, S. (2018). Security and privacy issues in IoT-enabled home routers: Analysis and mitigation strategies. IEEE Internet of Things Journal, 5(5), 3640-3649. https://doi.org/10.1109/JIOT.2018.2817589
28. Jammalamadaka, S.K.R.; Chokara, B.; Jammalamadaka, S.B.; Duvvuri, B.K.; Budaraju, R. Enhancing the Fault Tolerance of a Multi-Layered IoT Network through Rectangular and Interstitial Mesh in the Gateway Layer. J. Sens. Actuator Netw. 2023, 12, 76. [Google Scholar] [CrossRef]
29. Gokul Ramadoss. (2021). Leveraging Affordable Care Act to Improve Global Healthcare. European Journal of Advances in Engineering and Technology, 8(5), 41–44. https://doi.org/10.5281/zenodo.13789625
30. Zhang, J., & Li, Z. (2020). A comprehensive study on router firmware vulnerabilities and their exploitation in consumer devices. Journal of Network and Computer Applications, 116, 1-12. https://doi.org/10.1016/j.jnca.2018.12.011
31. Giridhar Kankanala, Sudheer Amgothu, "SAP Migration Strategies", International Journal of Science and Research (IJSR), Volume 12 Issue 12, December 2023, pp. 2168-2171, https://www.ijsr.net/getabstract.php?paperid=SR23128151813, DOI: https://www.doi.org/10.21275/SR23128151813
32. Saurabh Gupta, Advanced Credit Scoring Models Using Dremio And Google Cloud ML: Developing Machine Learning Algorithms That Incorporate Alternative Data Sources To Enhance Credit Scoring Accuracy - Saurabh Gupta - IJFMR Volume 4, Issue 3, May-June 2022. DOI 10.36948/ijfmr.2022.v04i03.13936.
33. Brahmaji, K.K.P. (2024). Explainable AI in data analytics: Enhancing transparency and trust in complex machine learning models. International Journal of Computer Engineering and Technology, 15(5), 1054–1061. https://iaeme.com/MasterAdmin/Journal_uploads/IJCET/VOLUME_15_ISSUE_5/IJCET_15_05_099.pdf
34. Hazzazi, M. M., Budaraju, R. R., Bassfar, Z., Albakri, A., & Mishra, S. (2023). A Finite State Machine-Based Improved Cryptographic Technique. Mathematics, 11(10), 2225.
35. Priyanka Gowda Ashwath Narayana Gowda, "Java HTTP Client for Web Applications", Journal of Scientific and Engineering Research, 2022, 9(2): 168-174.
36. Giridhar Kankanala, Sudheer Amgothu, "Load Balancers in the Cloud-Research Strategy applied in SAP Cloud", International Journal of Science and Research (IJSR), Volume 11 Issue 8, August 2022, pp. 1563-1565, https://www.ijsr.net/getabstract.php?paperid=SR22087121208, DOI: https://www.doi.org/10.21275/SR22087121208
37. Naga Lalitha Sree Thatavarthi (2024). Implementing Cybersecurity Measures in Furniture E-Commerce Platforms Using .NET. Journal of Mathematical & Computer Applications. SRC/JMCA-216. DOI: doi.org/10.47363/JMCA/2024(3)181.
38. Naga Satya Praveen Kumar Yadati (2022) Enhancing Cybersecurity and Privacy with Artificial Intelligence. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-376. DOI: doi.org/10.47363/JAICC/2022(1)359
39. Sastry, J.K.; Ch, B.; Budaraju, R.R. Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm. Sensors 2023, 23, 4032. [Google Scholar] [CrossRef]
40. Priyanka Gowda Ashwath Narayana Gowda, “Securing Microservices Architecture Using JSON Web Tokens (JWS)”, N. American. J. of Engg. Research, vol. 4, no. 3, Aug. 2023, Accessed: Dec. 31, 2024. [Online]. Available: https://najer.org/najer/article/view/75
41. Rajarao Tadimety Akbar Doctor, Sambiah Gunkala, 2016.” A Method and System for Automated Light Intensity Testing of Building Management, patent Office IN, Patent number 201641001890, Application number 201641001890.
42. Dixit, A., Sabnis, A. and Shetty, A., 2022. Antimicrobial edible films and coatings based on N, O-carboxymethyl chitosan incorporated with ferula asafoetida (Hing) and adhatodavasica (Adulsa) extract. Advances in Materials and Processing Technologies, 8(3), pp.2699-2715.
43. Aparna K Bhat, Rajeshwari Hegde, 2014. “Comprehensive Analysis of Acoustic Echo Cancellation Algorithms on DSP Processor”, International Journal of Advance Computational Engineering and Networking (IJACEN), volume 2, Issue 9, pp.6-11. [Link]
44. Apurva Kumar, Shilpa Priyadarshini, “Adaptive AI Infrastructure: A Containerized Approach For Scalable Model Deployment”, International Research Journal of Modernization in Engineering Technology and Science, Volume:06/Issue:11/November-2024, https://www.doi.org/10.56726/IRJMETS64700
45. Chandrakanth Lekkala (2023) Deploying and Managing Containerized Data Workloads on Amazon EKS. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-342. DOI: doi.org/10.47363/JAICC/2023 (2)324.
46. Priyanka Gowda Ashwath Narayana Gowda (2022) Zero Trust: A Paradigm Shift in Banking Cybersecurity. Journal of Economics & Management Research. SRC/JESMR-E104. DOI: doi.org/10.47363/JESMR/2022 (3) E104. E. D. Rao, "Multimedia Based Intelligent Content Networking for Future Internet," 2009 Third UKSim European Symposium on Computer Modeling and Simulation, Athens, Greece, 2009, pp. 55-59, doi: 10.1109/EMS.2009.108.
47. Dhameliya, N. (2022). Power Electronics Innovations: Improving Efficiency and Sustainability in Energy Systems. Asia Pacific Journal of Energy and Environment, 9(2), 71-80.
48. Apr 28, 2023 Machine Learning (ML) Artificial Intelligence (AI): Business Rules Management Systems (BRMS): Data Analytics: Information Systems
49. Naga Ramesh Palakurti, Empowering Rules Engines: AI and ML Enhancements in BRMS for Agile Business Strategies. (2022). International Journal of Sustainable Development through AI, ML and IoT, 1(2), 1-20. https://ijsdai.com/index.php/IJSDAI/article/view/36
50. Palakurti, N. R. (2024). Bridging the Gap: Frameworks and Methods for Collaborative Business Rules Management Solutions. International Scientific Journal for Research, 6(6), 1–22. Retrieved from https://isjr.co.in/index.php/ISJR/article/view/207
51. Naga Ramesh Palakurti, 2023. AI-Driven Personal Health Monitoring Devices: Trends and Future Directions, ESP Journal of Engineering & Technology Advancements 3(3): 41-51.
52. Naga Ramesh Palakurti, 2023. "Evolving Drug Discovery: Artificial Intelligence and Machine Learning's Impact in Pharmaceutical Research" ESP Journal of Engineering & Technology Advancements 3(3): 136-147.
53. Palakurti, N. R. (2024). Challenges and Future Directions in Anomaly Detection. In Practical Applications of Data Processing, Algorithms, and Modeling (pp. 269-284). IGI Global.
54. Priyanka Gowda Ashwath Narayana Gowda, "Benefits and Risks of Generative AI in FinTech", Journal of Scientific and Engineering Research, 2024, 11(5):267-275.
55. Choudhary, S. K., Ranjan, P., Dahiya, S., & Singh, S. K. DETECTING MALWARE ATTACKS BASED ON MACHINE LEARNING TECHNIQUES FOR IMPROVE CYBERSECURITY.
56. Ranjan, P., & Dahiya, S. (2021). Advanced threat detection in API security: Leveraging machine learning algorithms. International Journal of Communication Networks and Information Security, 13(1). Retrieved from https://ijcnis.org/
57. Ranjan, Piyush. (2024). Optimizing API Security in FinTech through Genetic Algorithm based Machine Learning Model. International Journal of Computer Network and Information Security. 13. 24.
58. Singh, S. K., Choudhary, S. K., Ranjan, P., Cognizant, N. J., & Dahiya, S. COMPARATIVE ANALYSIS OF MACHINE LEARNING MODELS AND DATA ANALYTICS TECHNIQUES FOR FRAUD DETECTION IN BANKING SYSTEM.
59. Ranjan, P., Khunger, A., Satya, C. B. V. V., & Dahiya, S. Threat Modeling and Risk Assessment of APIs in Fintech Applications.
60. Choudhary, S. K., Ranjan, P., Dahiya, S., & Singh, S. K. DETECTING MALWARE ATTACKS BASED ON MACHINE LEARNING TECHNIQUES FOR IMPROVE CYBERSECURITY.
61. Ajay Tanikonda, Sudhakar Reddy Peddinti, Brij Kishore Pandey, and Subba Rao Katragadda. “Advanced AI-Driven Cybersecurity Solutions for Proactive Threat Detection and Response in Complex Ecosystems”. Journal of Science & Technology, vol. 3, no. 1, Jan. 2022, pp. 196-18, https://thesciencebrigade.com/jst/article/view/508.
62. N. R. Palakurti, “Machine Learning Mastery: Practical Insights for Data Processing”, Practical Applications of Data Processing, Algorithms, and Modeling, p. 16-29, 2024.
63. Karthik Chowdary Tsaliki, "Revolutionizing Identity Management with AI: Enhancing Cyber Security and Preventing ATO", International Research Journal of Modernization in Engineering Technology and Science, volume: 6/Issue: 04/April-2024.
64. NoSQL Databases in Big Data: Advancements, Challenges, and Future Directions - Sainath Muvva - IJSAT Volume 14, Issue 2, April-June 2023. DOI 10.5281/zenodo.14514132
65. Chandrakanth Lekkala, “Utilizing Cloud – Based Data Warehouses for Advanced Analytics: A Comparative Study”, International Journal of Science and Research (IJSR), Volume 11 Issue 1, January 2022, pp. 1639-1643, https://www.ijsr.net/getabstract.php?paperid=SR24628182046
66. Karthik Hosavaranchi Puttaraju, "Harnessing Disruptive Technologies: Strategic Approach to Retail Product Innovation", International Journal of Scientific Research in Engineering and Management (IJSREM), VOLUME: 08 ISSUE: 01 | JAN - 2024.
67. Bhat, V. Gojanur, and R. Hegde. 2015. “4G protocol and architecture for BYOD over Cloud Computing”. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313.
68. Bhat, A., & Gojanur, V. (2015). Evolution of 4g: A Study. International Journal of Innovative Research in ComputerScience & Engineering (IJIRCSE). Booth, K. (2020, December 4). How 5G is breaking new ground in the construction industry. BDC Magazine.https://bdcmagazine.com/2020/12/how-5g-is-breaking-new-ground-in-the-constructionindustry/.
69. Chanthati, S. R. (2024). Website Visitor Analysis & Branding Quality Measurement Using Artificial Intelligence. Sasibhushan Rao Chanthati. https://journals.e-palli.com/home/index.php/ajet. https://doi.org/10.54536/ajet.v3i3.3212
70. Chanthati, Sasibhushan Rao. (2024). How the power of machine -machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks. 100-119. 10.30574/gjeta.2024.20.2.0149.Sasibhushan Rao Chanthati. https://doi.org/10.30574/gjeta.2024.20.2.0149, https://gjeta.com/sites/default/files/GJETA-2024-0149.pdf
71. Chanthati, Sasibhushan Rao. (2021). A segmented approach to encouragement of entrepreneurship using data science. World Journal of Advanced Engineering Technology and Sciences. https://doi.org/10.30574/wjaets.2024.12.2.0330,
72. Naga Ramesh Palakurti, 2023. AI-Driven Personal Health Monitoring Devices: Trends and Future Directions, ESP Journal of Engineering & Technology Advancements, 3(3): 41-51.
73. Naga Ramesh Palakurti, 2023. "Evolving Drug Discovery: Artificial Intelligence and Machine Learning's Impact in Pharmaceutical Research" ESP Journal of Engineering & Technology Advancements 3(3): 136-147.
74. Palakurti, N. R., & Kolasani, S. (2024). AI-Driven Modeling: From Concept to Implementation. In Practical Applications of Data Processing, Algorithms, and Modeling (pp. 57-70). IGI Global.
75. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Low-Power FPGA Design Techniques for Next-Generation Mobile Devices", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 82-93.
76. Dhamotharan Seenivasan, Muthukumaran Vaithianathan, 2023. "Real-Time Adaptation: Change Data Capture in Modern Computer Architecture", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 1, Issue 2: 49-61.
77. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Integrating AI and Machine Learning with UVM in Semiconductor Design", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 3: 37-51.
78. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Energy-Efficient FPGA Design for Wearable and Implantable Devices", ESP International Journal of Advancements in Science & Technology (ESP-IJAST), Volume 2, Issue 2: 37-51.
79. Manish Krishnan, Tong Jiang, Vivekananda Shenoy, Soumil Ramesh Kulkarni, Vinod Nair, Jeba Paulaiyan, 2020 Cloud network having multiple protocols using virtualization overlays across physical and virtualized workloads” United States Patent Application Publication, Application number- 16368381.
80. Manish Krishnan, Tong Jiang, Vivekananda Shenoy, Soumil Ramesh Kulkarni, Vinod Nair, Jeba Paulaiyan, 2020 Cloud network having multiple protocols using virtualization overlays across physical and virtualized workloads” United States Patent Application Publication, Application number- 16368381.
81. Patel, N. (2024, March). “Secure Access Service Edge (SASE): “Evaluating The Impact Of Convereged Network Security Architectures In Cloud Computing.” Journal of Emerging Technologies and Innovative Research. https://www.jetir.org/papers/JETIR2403481.pdf
82. Mistry, H., Shukla, K., & Patel, N. (2024). Transforming Incident Responses, Automating Security Measures, and Revolutionizing Defence Strategies throughAI-Powered Cybersecurity. Journal of Emerging Technologies and Innovative Research, 11(3), 25. https://www.jetir.org/
83. Shashikant Tank Kumar Mahendrabhai Shukla, Nimeshkumar Patel, Veeral Patel, 2024. ”AI Based Cyber Security Data Analytic Device”, 414425-001,
84. Anusha Medavaka, 2024. "AWS AI from Financial Services Transforming Risk Management and Investment Strategies", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 3: 116-129.
85. Naresh Kumar Miryala, Divit Gupta, "Big Data Analytics in Cloud – Comparative Study," International Journal of Computer Trends and Technology, vol. 71, no. 12, pp. 30-34, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I12P107
86. Naresh Kumar Miryala, Divit Gupta, "Data Security Challenges and Industry Trends" IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, vol. 11, no.11, pp. 300-309, 2022, Crossref https://doi.org/10.17148/IJARCCE.2022.111160
87. Sridhar Selvaraj, 2024. "SAP Supply Chain with Industry 4.0" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 1: 44-48. | Google Scholar
88. Saurav Bhattacharya, "reGIFCAPTCHA: Revolutionizing User Interaction and Security in CAPTCHA Technology", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 12, page no.d891-d893, December-2023, Available: http://www.jetir.org/papers/JETIR2312398.pdf
89. Bhattacharya, S., & Kewalramani, C. (2024). Securing Virtual Reality: A Multimodal Biometric Authentication Framework for VRaaS. International Journal of Global Innovations and Solutions (IJGIS). https://doi.org/10.21428/e90189c8.25802e82
90. Venkata Sathya Kumar Koppisetti, 2024. "Robotic Process Automation: Streamlining Operations in the Digital Era", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 74-81.
91. Venkata Sathya Kumar Koppisetti, 2024. "Deep Learning: Advancements and Applications in Artificial Intelligence" ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 106-113.
92. Kushal Walia, 2024. "Accelerating AI and Machine Learning in the Cloud: The Role of Semiconductor Technologies", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 34-41. | Google Scholar
93. Sumanth Tatineni, Anirudh Mustyala, 2024. "Enhancing Financial Security: Data Science's Role in Risk Management and Fraud Detection" ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 94-105.
94. Arnab Dey, 2021. “Implementing Latest Technologies from Scratch: A Strategic Approach for Application Longevity” European Journal of Advances in Engineering and Technology, 2021, 8 (8): 22-26. | PDF
95. Dhamotharan Seenivasan, "Improving the Performance of the ETL Jobs," International Journal of Computer Trends and Technology, vol. 71, no. 3, pp. 27-33, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I3P105
96. Pratiksha Agarwal, Arun Gupta, "Harnessing the Power of Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) Systems for Sustainable Business Practices," International Journal of Computer Trends and Technology, vol. 72, no. 4, pp. 102-110, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I4P113
97. S. E. V. S. Pillai and K. Polimetla, "Enhancing Network Privacy through Secure Multi-Party Computation in Cloud Environments," 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, 2024, pp. 1-6, doi: 10.1109/ICICACS60521.2024.10498662.
98. Amit Mangal, 2022. "Envisioning the Future of Professional Services: ERP, AI, and Project Management in the Age of Digital Disruption", ESP Journal of Engineering & Technology Advancements 2(4): 71-79.
99. Kumar, S. M. Ahmed and V. K. Duleb, "English text compression for small messages," ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia, Kuala Lumpur, Malaysia, 2011, pp. 1-5, doi: 10.1109/ICIMU.2011.6122737.
100. Shreyaskumar Patel "Performance Analysis of Acoustic Echo Cancellation using Adaptive Filter Algorithms with Rician Fading Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2, February 2022, pp.1541-1547, URL: https://www.ijtsrd.com/papers/ijtsrd49144.pdf
101. Borra, Praveen, “An overview of cloud data warehouses: Amazon Redshift (AWS), Azure Synapse (Azure), and Google BigQuery (GCP)”, International Journal of Advanced Research in Computer Science 15 3, 23-27, 2024, IJARCS.
102. A. Hassan, “Software Security - Threats, Vulnerabilities, and Countermeasures: Investigating common security threats, vulnerabilities, and countermeasures in software systems to enhance security posture”, Australian Journal of Machine Learning Research & Applications, vol. 4, no. 1, pp. 35–45, May 2024, Accessed: Jul. 18, 2024. [Online]. Available: https://sydneyacademics.com/index.php/ajmlra/article/view/12
103. Dixit, A., Sabnis, A., Balgude, D., Kale, S., Gada, A., Kudu, B., Mehta, K., Kasar, S., Handa, D., Mehta, R. and Kshirsagar, S., 2023. Synthesis and characterization of citric acid and itaconic acid-based two-pack polyurethane antimicrobial coatings. Polymer Bulletin, 80(2), pp.2187-2216.
104. Dasaratha, D. A., A. Prasad, M. Kumar, P. Kamal, S. V., S. (2024). Strategizing IoT Network Layer Security through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of Intelligent Systems and Internet of Things, (), 195-207. DOI: https://doi.org/10.54216/JISIoT.120215
105. Thapliyal, P. S. Bhagavathi, T. Arunan and D. D. Rao, "Realizing Zones Using UPnP," 2009 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009, pp. 1-5, doi: 10.1109/CCNC.2009.4784867.
106. Rao, Deepak, and Sourabh Sharma. "Secure and Ethical Innovations: Patenting Ai Models for Precision Medicine, Personalized Treatment, and Drug Discovery in Healthcare." International Journal of Business Management and Visuals, ISSN: 3006-2705 6.2 (2023): 1-8.
107. Mistry, H., Shukla, K., & Patel, N. (2024). Transforming Incident Responses, Automating Security Measures, and Revolutionizing Defence Strategies throughAI-Powered Cybersecurity. Journal of Emerging Technologies and Innovative Research, 11(3), 25. https://www.jetir.org/
108. Chandrakanth Lekkala 2022. “Integration of Real-Time Data Streaming Technologies in Hybrid Cloud Environments: Kafka, Spark, and Kubernetes”, European Journal of Advances in Engineering and Technology, 2022, 9(10):38-43.
109. Vikramrajkumar Thiyagarajan, 2024. “Predictive Modeling for Revenue Forecasting in Oracle EPBCS: A Machine Learning Perspective”, International Journal of Innovative Research of science, Engineering and technology (IJIRSET), Volume 13, Issue 4,
110. Dixit, A.S., Patwardhan, A.V. and Pandit, A.B., 2021. PARAMETER OPTIMIZATION OF PRODIGIOSIN BASEDDYE-SENSITIZED SOLAR CELL. International Journal of Pharmaceutical, Chemical & Biological Sciences, 11(1), pp.19-29.
111. Nilesh G Charankar, Dileep Kumar Pandiya, Anand Kumar Singh, "Leveraging Low-Code Platforms for Rapid API Development", International Journal of Science & Engineering Development Research (www.ijrti.org), ISSN:2455-2631, Vol.9, Issue 6, page no.49 - 55, June-2024, Available : http://www.ijrti.org/papers/IJRTI2406009.pdf
112. Dileep Kumar Pandiya, Nilesh G Charankar, Anand Kumar Singh, "The Impact of AI on API Monetization: Dynamic Pricing, Personalization, and Business Intelligence", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 6, page no.a19-a22, June-2024, Available : http://www.jetir.org/papers/JETIR2406003.pdf
113. V. Kumar Nomula, “A Novel Approach to Analyzing Medical Sensor Data Using Physiological Models,” FMDBTransactions on Sustainable Health Science Letters, vol. 1, no. 4, pp. 186 –197, 2023.
114. Archana Balkrishna, Yadav (2024) An Analysis on the Use of Image Design with Generative AI Technologies. International Journal of Trend in Scientific Research and Development, 8 (1). pp. 596-599. ISSN 2456-6470
115. Tharun Anand Reddy S (2022). Ambient Computing: The Integration of Technology into Our Daily Lives. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-147. DOI: doi.org/10.47363/JAICC/2022(1)135.
116. Sainath Muvva, 2021. "Cloud-Native Data Engineering: Leveraging Scalable, Resilient, and Efficient Pipelines for the Future of Data", ESP Journal of Engineering & Technology Advancements 1(2): 287-292.
117. Sarangkumar Radadia Kumar Mahendrabhai Shukla, Nimeshkumar Patel, Hirenkumar Mistry, Keyur Dodiya 2024. ”Cyber Security Detecting And Alerting Device”, 412409-001.
118. M. Hindka, “Securing the Digital Backbone: An In-depth Insights into API Security Patterns and Practices”, Computer Science and Engineering, Vol. 14, No. 2, pp. 35-41, 2024.
119. M. Hindka, “Design and Analysis of Cyber Security Capability Maturity Model”, International Research Journal of Modernization in Engineering Technology and Science, Vol. 6, No. 3, pp. 1706-1710, 2024.
120. M. Siva Kumar et al, “Efficient and low latency turbo encoder design using Verilog-Hdl,” Int. J. Eng. Technol., vol. 7, no. 1.5, pp. 37–41, Dec. 2018,[Link]
121. Kartheek Pamarthi, 2024.” Analysis On Opportunities And Challenges Of Ai In The Banking Industry”, International Journal of Artificial Intelligence and Data Science, Volume 1, Issue 2:10-23.
122. B. Yadav and P. S. Shukla, "Augmentation to water supply scheme using PLC & SCADA," 2011 Nirma University International Conference on Engineering, Ahmedabad, India, 2011, pp. 1-5, doi: 10.1109/NUiConE.2011.6153314.
123. Yadav, A. B. (2023). Gen AI-Driven Electronics: Innovations, Challenges and Future Prospects. International Congress on Models and Methods in Modern Investigations, 113–121. Retrieved from https://conferenceseries.info/index.php/congress/article/view/1609
124. Ankitkumar Tejani, 2021. "Assessing the Efficiency of Heat Pumps in Cold Climates: A Study Focused on Performance Metrics", ESP Journal of Engineering & Technology Advancements 1(1): 47-56.
125. Katragadda, V. (2024). Leveraging Intent Detection and Generative AI for Enhanced Customer Support. Journal of Artificial Intelligence General Science (JAIGS) ISSN:3006-4023, 5(1), 109–114. https://doi.org/10.60087/jaigs.v5i1.178.
126. Sainath Muvva, Privacy-Preserving Data Engineering: Techniques, Challenges, and Future Directions, International Journal of Scientific Research in Engineering and Management, Volume: 05 Issue: 07 | July - 2021.
127. Ankitkumar Tejani, 2021. "Integrating Energy-Efficient HVAC Systems into Historical Buildings: Challenges and Solutions for Balancing Preservation and Modernization", ESP Journal of Engineering & Technology Advancements, 1(1): 83-97.
128. Jawahar Thangavelu, 2024. "Software Verification in Avionics: Integrating Hardware in the Loop (HIL) Testing", ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 4: 45-54.
129. Sainath Muvva, Blockchain Technology in Data Engineering: Enhancing Data Integrity and Traceability in Modern Data Pipeline, International Journal of Leading Research Publication (IJLRP), Volume 4, Issue 7, July 2023. DOI 10.5281/zenodo.14646547.
130. Jawahar Thangavelu, 2024. "Artificial Intelligence in Engineering Design: Enhancing Creativity and Efficiency", ESP International Journal of Advancements in Science & Technology (ESP-IJAST) Volume 2, Issue 3: 29-39.
131. M. Rele and D. Patil, "Revolutionizing Liver Disease Diagnosis: AI-Powered Detection and Diagnosis", International Journal of Science and Research (IJSR), 2023.https://doi.org/10.21275/SR231105021910
132. Lakshmana Kumar Yenduri, 2024. "Low Latency High Throughput Data Serving Layer for Generative AI Applications using the REST-based APIs" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 3: 61-76.
133. V. Kakani, B. Kesani, N. Thotakura, J. D. Bodapati and L. K. Yenduri, "Decoding Animal Emotions: Predicting Reactions with Deep Learning for Enhanced Understanding," 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), Pune, India, 2024, pp. 1-6, doi: 10.1109/I2CT61223.2024.10543616.
134. Hari Prasad Bhupathi, Srikiran Chinta, 2023. "Optimizing EV Ecosystems: AI and Machine Learning in Battery Charging" ESP International Journal of Advancements in Science & Technology (ESP-IJAST, Volume 1, Issue 3: 84-96.
135. Hari Prasad Bhupathi, Srikiran Chinta, 2022. "Predictive Algorithms for EV Charging: AI Techniques for Battery Optimization", ESP Journal of Engineering & Technology Advancements, 2(4): 165-178.
136. Vinay Panchal, 2025. “Designing for Longer Battery Life: Power Optimization Strategies in Modern Mobile SOCS”, International Journal of Electrical Engineering and Technology (IJEET) Volume 16, Issue 1, January-February 2025, pp. 1-17, Article ID: IJEET_16_01_001 Available online at https://iaeme.com/Home/issue/IJEET?Volume=16&Issue=1
137. Vinay Panchal, 2024. “Thermal and Power Management Challenges in High-Performance Mobile Processors”, International Journal of Innovative Research of Science, Engineering and Technology (IJIRSET), Volume 13, Issue 11, November 2024 |DOI: 10.15680/IJIRSET.2024.1311014.
138. Mohanakrishnan Hariharan, 2025. "Reinforcement Learning: Advanced Techniques for LLM Behavior Optimization", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 84-101.
139. Srinivas Chippagiri, Preethi Ravula. (2021). Cloud-Native Development: Review of Best Practices and Frameworks for Scalable and Resilient Web Applications. International Journal of New Media Studies: International Peer Reviewed Scholarly Indexed Journal, 8(2), 13–21. Retrieved from https://ijnms.com/index.php/ijnms/article/view/294
140. Sakthivel Rasu (2022). Impact of Simulation Tools on Mechanical Design Validation. Journal of Engineering and Applied Sciences Technology. SRC/JEAST-E135. DOI: doi.org/10.47363/JEAST/2022(4)E135.
141. Sukhdevsinh Dhummad, 2025. "The Imperative of Exploratory Data Analysis in Machine Learning", Scholars Journal of Engineering and Technology | Volume-13 | Issue-01 | DOI: https://doi.org/10.36347/sjet.2025.v13i01.005.
142. Sateesh Reddy Adavelli, Nivedita Rahul, "Personalized P&C Policies: Leveraging Big Data and Machine Learning to Tailor Insurance Coverage for Individual Risk Profiles", International Journal of Innovative Research in Computer and Communication Engineering, Volume 11, Issue 3, March 2023.
143. Sateesh Reddy Adavelli, "AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in DataDriven Transformation", International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Volume 12, Issue 6, June 2023.
6B New Colony, Edamalaipatti Pudur, Tiruchirappalli.
International Journal of Multidisciplinary on Science and Management [IJMSM] is a scholarly double-blind peer-reviewed journal published by Golden Sun-Rise.
2024 © Golden Sun-Rise.