COMPARATIVE STUDY OF MULTI-CLOUD DATA ENGINEERING STRATEGIES
Main Article Content
Abstract
Best practices from data engineering processes have been significantly modified in disparate sectors due to multi-cloud solutions only, involving multiple cloud service providers (CSP). Multi-cloud data engineering enables businesses to distribute workloads across different cloud platforms, increasing performance, reducing the potential for vendor lock-in, and supporting scalability. Notably will be covered and assessed in this study that pertains to multi-cloud data engineering are: Data integration Security Cost optimisation and System interoperability. The report begins with a historical overview of cloud computing and multi-cloud approaches that highlight why organizations have adopted these setups. Part of the reason for this is the need to comply with data rules throughout many countries, along with requirements for more resilience and flexibility. The study covers fundamentals of multi-cloud architecture such as data replication, workload allocation, and resource management. It explores data engineering practices of various companies operating with focus scheduled optimization resources, merging multiple data sources, and defining metrics for cloud service selection. The research also compares managing data pipelines for ingestion to transformation, storage, and processing across clouds with cloud-native versus third-party tools. When handling information across several clouds, protecting sensitive material and ensuring compliance rules at every data engineering level is of the biggest significance. This paper is a twofold concern; one is looking on security, and another on compliance.
Article Details
How to Cite
References
C. A. Subasini and S. Nikkath Bushra 2021, ‘Securing of cloud data with duplex data encryption algorithm’, 5th International Conference on Computing Methodologies and Communication (ICCMC), India, 2021, pp. 252-256.
C. Guo, R. Zhuang, C. Su, C. Z. Liu and K. R. Choo 2019, ‘Secure and efficient {k}- nearest neighbor query over encrypted uncertain data in cloud-iot ecosystem’, IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9868-9879.
C. Liu, L. Zhu and J. Chen 2017, ‘Graph encryption for top-k nearest keyword search queries on cloud’, IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 371-381.
C. Wang, C. Gill and C. Lu 2020, ‘Adaptive data replication in real- time reliable edge computing for internet of things’, IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), Sydney, NSW, Australia, pp. 128-134.
Chenchev, I 2023, ‘Framework for multi-factor authentication with dynamically generated passwords’, In: Arai, K. (eds) Advances in Information and Communication. FICC , Lecture Notes in Networks and Systems, vol. 2.
D. Chen and H. Zhao 2012, ‘Data security and privacy protection issues in cloud computing’, International Conference on Computer Science and Electronics Engineering, Hangzhou, China, pp. 647-651.
D. Xu, C. Fu, G. Li, D. Zou, H. Zhang and X. Liu 2017, ‘Virtualization of the encryption card for trust access in cloud computing’, IEEE Access, vol. 5, pp. 20652-20667.
Daniel Fitch And Haiping Xu 2013, ‘A RAID-based secure and fault- tolerant model for cloud information storage’, International Journal of Software Engineering and Knowledge Engineering, vol. 23, no. 05, pp. 627-654
H. Cheng, C. Rong, M. Qian and W. Wang 2018, ‘Accountable privacy-preserving mechanism for cloud computing based on identity- based encryption’, IEEE Access, vol. 6, pp. 37869-37882.
'H. Xiong and J. Sun 2017, ‘Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing’, IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 4, pp. 461-462.
Hakjun Lee, Dongwoo Kang, Youngsook Lee, Dongho Won 2021, ‘Secure three-factor anonymous user authentication scheme for cloud computing environment’, Wireless Communications and Mobile Computing, vol.2021, pp.1-20.
J. Wei, W. Liu and X. Hu 2018, ‘Secure data sharing in cloud computing using revocable-storage identity-based encryption’, IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1136-1148.
Joseph Williamson and Kevin Curran 2021, ‘Best practice in multi- factor authentication’ Semiconductor Science and Information Devices, vol.3, no.1.
P. Zeng and K. R. Choo 2018, ‘A new kind of conditional proxy re-encryption for secure cloud storage’, IEEE Access, vol.6, pp. 70017-70024”.