{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:28:55Z","timestamp":1760171335095,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,18]]},"DOI":"10.1109\/ic3i61595.2024.10828803","type":"proceedings-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:34:30Z","timestamp":1736969670000},"page":"1631-1636","source":"Crossref","is-referenced-by-count":3,"title":["Comprehensive Approaches to Securing Multi-Cloud Architectures: Best Practices and Emerging Solutions"],"prefix":"10.1109","author":[{"given":"Raveena R","family":"Nair","sequence":"first","affiliation":[{"name":"Saveetha Institute of Medical and Technical Sciences (SIMATS),Saveetha School of Law,Chennai,India"}]},{"given":"D.","family":"Sreevidya","sequence":"additional","affiliation":[{"name":"VNRVJIET Nizampet,Department of CSE (CyS, DS) and AI &#x0026; DS,Hyderabad,India"}]},{"given":"Chinnem Rama","family":"Mohan","sequence":"additional","affiliation":[{"name":"Narayana Engineering College Nellore,Department of Computer Science and Engineering,Andhra Pradesh,India"}]},{"given":"Joydeep","family":"Banerjee","sequence":"additional","affiliation":[{"name":"NSHM Knowledge Campus Durgapur,Kolkata,West Bengal,India"}]},{"given":"Kuldeep","family":"Chouhan","sequence":"additional","affiliation":[{"name":"Sharda School of Engineering and Technology Greater Noida,Department of Computer Science Applications,Uttar Pradesh,India"}]},{"family":"Dharamvir","sequence":"additional","affiliation":[{"name":"The Oxford College of Engineering Bommanahalli,Department of MCA,Bengaluru,Karnataka,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3463274.3463345"},{"issue":"1","key":"ref2","first-page":"71","article-title":"Challenges and Solutions for Integrating AI with Multi-Cloud Architectures","volume":"1","author":"Kumar","year":"2022","journal-title":"International Journal of Multidisciplinary Innovation and Research Methodology"},{"issue":"1","key":"ref3","first-page":"233","article-title":"Securing Multi-Cloud Architectures: A Machine Learning Perspective","volume-title":"Journal of Artificial Intelligence General science (JAIGS)","volume":"2","author":"Mamidi"},{"key":"ref4","first-page":"1","article-title":"Multi-cloud: a comprehensive review","volume-title":"2020 ieee 23rd international multitopic conference (inmic)","author":"Imran"},{"author":"Goswami","key":"ref5","article-title":"Challenges and Solutions in Integrating AI with Multi-Cloud Architectures"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00367-6"},{"article-title":"The Cloud Computing Journey: Design and deploy resilient and secure multi-cloud systems with practical guidance","year":"2024","author":"Gupta","key":"ref7"},{"issue":"2","key":"ref8","doi-asserted-by":"crossref","first-page":"67","DOI":"10.4018\/IJCAC.2021040105","article-title":"Multi-cloud adoption challenges for the cloud-native era: Best practices and solution approaches","volume":"11","author":"Chelliah","year":"2021","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"issue":"9","key":"ref9","first-page":"379","article-title":"Cloud computing security for multi-cloud service providers: Controls and techniques in our modern threat landscape","volume-title":"International Journal of Computer and Systems Engineering","volume":"16","author":"Achar"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00224-y"},{"issue":"2","key":"ref11","doi-asserted-by":"crossref","first-page":"3985","DOI":"10.32604\/cmc.2022.019962","article-title":"Enhancing cloud performance using file format classifications","volume":"70","author":"Junaid","year":"2021","journal-title":"Computers, Materials & Continua"},{"article-title":"Identity management in cross-cloud environments: Towards self-sovereign identities using current solutions","year":"2024","author":"Salah","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"101469","DOI":"10.1016\/j.is.2019.101469","article-title":"Design principles for the General Data Protection Regulation (GDPR): A formal concept analysis and its evaluation","volume":"91","author":"Tamburri","year":"2020","journal-title":"Information Systems"},{"issue":"2","key":"ref14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.18034\/abcjar.v9i2.608","article-title":"The challenge of achieving zero trust remote access in multi-cloud environment","volume":"9","author":"Chimakurthi","year":"2020","journal-title":"ABC Journal of Advanced Research"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","article-title":"Data security and privacy protection for cloud storage: A survey","volume":"8","author":"Yang","year":"2020","journal-title":"Ieee Access"},{"article-title":"Identity management in cross-cloud environments: Towards self-sovereign identities using current solutions","year":"2024","author":"Salah","key":"ref16"},{"article-title":"Barriers to Adoption of Advanced Cybersecurity Tools in Organizations","year":"2023","author":"Anthony","key":"ref17"},{"issue":"1","key":"ref18","first-page":"71","article-title":"Challenges and Solutions for Integrating AI with Multi-Cloud Architectures","volume":"1","author":"Kumar","year":"2022","journal-title":"International Journal of Multidisciplinary Innovation and Research Methodology"},{"key":"ref19","first-page":"390","article-title":"Handling security issues by using homomorphic encryption in multi-cloud environment","volume-title":"Procedia Computer Science","volume":"220","author":"Ameur"},{"issue":"3","key":"ref20","first-page":"p.100086","article-title":"Blockchain for decentralised rural development and governance","volume":"3","author":"Merrell","year":"2022","journal-title":"Blockchain: Research and Applications"},{"issue":"2","key":"ref21","first-page":"0112","article-title":"Securing Multi-Cloud Environments with AI And Machine Learning Techniques","volume":"16","author":"Reddy","year":"2021"},{"issue":"1","key":"ref22","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1186\/s12859-022-05044-8","article-title":"EasySMPC: a simple but powerful no-code tool for practical secure multiparty computation","volume":"23","author":"Wirth","year":"2022","journal-title":"BMC bioinformatics"},{"volume-title":"Considerations for Selecting and Implementing Cloud Security Solutions Using Cloud Access Security Brokers","year":"2023","author":"Collier","key":"ref23"}],"event":{"name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2024,9,18]]},"location":"Greater Noida, India","end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 7th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10828566\/10827843\/10828803.pdf?arnumber=10828803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:42:33Z","timestamp":1740080553000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10828803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ic3i61595.2024.10828803","relation":{},"subject":[],"published":{"date-parts":[[2024,9,18]]}}}