{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:08:18Z","timestamp":1777734498988,"version":"3.51.4"},"reference-count":214,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Universiti Telekom Sdn. Bhd."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The rapid implementation of multi-cloud architectures, such as the integration of services from multiple cloud providers, gives organizations enhanced flexibility, resilience, and vendor independence. However, the multi-cloud model presents complicated security challenges due to diverse platforms, fragmented governance, and increased areas of concern. This paper presents a comprehensive literature review of the multi-cloud environment arena, focusing on the analysis of threats, vulnerabilities, cost optimization, mitigation strategies, and research trends. It covers a comprehensive range of risks, including data breaches, insider threats, API exploitation, configuration errors, and emerging multi-vector attacks, as well as the cumulative complexity of aligning policies, managing identities, and ensuring compliance across diverse providers. The review analyzes existing and proposed defence mechanisms, spanning cryptographic techniques, fuzzy-logic decision frameworks, AI and ML-driven detection systems, as well as integrated Identity and Access Management (IAM) systems. Analysis of relevant literature reveals a progression from basic foundational encryption systems toward more sophisticated, policy-driven, and collaboration-capable security frameworks. Additionally, the paper identifies significant research gaps in real-world validation, cost optimization, and unified governance models. This research departs from prior work by integrating multiple perspectives rather than limiting its scope to a single area such as security, defence, or cost optimization. It also provides new researchers with comprehensive background information on cloud architecture within a single article.<\/jats:p>","DOI":"10.3390\/fi17120548","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T15:11:24Z","timestamp":1764947484000},"page":"548","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7159-0569","authenticated-orcid":false,"given":"Labib","family":"Bayzid","sequence":"first","affiliation":[{"name":"Department of Computer Science, American International University Bangladesh, Dhaka 1229, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1710-4689","authenticated-orcid":false,"given":"Tonny","family":"Kar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University Bangladesh, Dhaka 1229, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4929-3209","authenticated-orcid":false,"given":"Mohammad","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Electrical, Electronic and Systems Engineering, Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia (UKM), Bangi 43600, Selangor, Malaysia"},{"name":"Computer and Information Sciences Research Center (CISRC), Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11646, Saudi Arabia"}]},{"given":"Md.","family":"Islam","sequence":"additional","affiliation":[{"name":"Centre for Advanced Devices and Systems, Centre of Excellence for Robotics and Sensing Technologies, Multimedia University, Persiaran Multimedia, Cyberjaya 63100, Selangor, Malaysia"},{"name":"Faculty of Artificial Intelligence and Engineering, Multimedia University, Persiaran Multimedia, Cyberjaya 63100, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0007-7294","authenticated-orcid":false,"given":"Firoz","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University Bangladesh, Dhaka 1229, Bangladesh"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s12065-020-00404-w","article-title":"Hybrid encryption framework for securing big data storage in multi-cloud environment","volume":"14","author":"Viswanath","year":"2021","journal-title":"Evol. Intell."},{"key":"ref_2","unstructured":"Canalys (2019, January 11). Cloud Market Share Q4 2018 and Full Year 2018. Available online: https:\/\/www.canalys.com\/newsroom\/cloud-market-share-q4-2018-and-full-year-2018."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"Subashini","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"AlZain, M.A., Pardede, E., Soh, B., and Thom, J.A. (2012, January 4\u20137). Cloud Computing Security: From Single to Multi-Clouds. Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), Maui, HI, USA.","DOI":"10.1109\/HICSS.2012.153"},{"key":"ref_5","first-page":"100004","article-title":"Trends and Challenges in Securing Cloud Computing Environments: An Overview of Current Techniques","volume":"1","author":"Ahmed","year":"2024","journal-title":"Prem. J. Comput. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1147\/rd.255.0483","article-title":"The Origin of the VM\/370 Time-Sharing System","volume":"25","author":"Creasy","year":"1981","journal-title":"IBM J. Res. Dev."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/JPROC.2008.2004311","article-title":"Magnetic Tape for Data Storage: An Enduring Technology","volume":"96","author":"Dee","year":"2008","journal-title":"Proc. IEEE"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1108\/10662241011059471","article-title":"World-Wide Web: The Information Universe","volume":"20","author":"Cailliau","year":"2010","journal-title":"Internet Res."},{"key":"ref_9","unstructured":"Hertzfeld, A. (2025, June 28). Bill and Andy\u2019s Excellent Adventure II. Wired Magazine. Available online: https:\/\/www.wired.com\/1994\/04\/general-magic\/."},{"key":"ref_10","unstructured":"Khajeh-Hosseini, A., Sommerville, I., and Sriram, I. (2010). Research Challenges for Enterprise Cloud Computing. arXiv."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Choudhary, V. (2007, January 3\u20136). Software as a Service: Implications for Investment in Software Development. Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS), Waikoloa, HI, USA.","DOI":"10.1109\/HICSS.2007.493"},{"key":"ref_12","unstructured":"Khajeh-Hosseini, A., Sommerville, I., and Sriram, I. (2010). Research Agenda in Cloud Technologies. arXiv."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/2382553.2382554","article-title":"Bringing Virtualization to the x86 Architecture with the Original VMware Workstation","volume":"30","author":"Bugnion","year":"2012","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_14","first-page":"1571","article-title":"Origin & History of ASP, SaaS, PaaS and Cloud Computing","volume":"12","author":"Matana","year":"2024","journal-title":"Int. J. Sci. Res. Manag."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Randal, A. (2019). The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers. arXiv.","DOI":"10.1145\/3365199"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Buyya, R., Calheiros, R.N., and Li, X. (2012). Autonomic Cloud Computing: Open Challenges and Architectural Elements. arXiv.","DOI":"10.1109\/EAIT.2012.6407847"},{"key":"ref_17","unstructured":"Yang, L., Jaffe, S., Holtz, D., Suri, S., Sinha, S., Weston, J., Joyce, C., Shah, N., Sherman, K., and Lee, C.J. (2020). How Work From Home Affects Collaboration: A Large-Scale Study of Information Workers in a Natural Experiment During COVID-19. arXiv."},{"key":"ref_18","unstructured":"L\u00f3pez Flores, N.G., Islind, A.S., and \u00d3skarsd\u00f3ttir, M. (2021). Effects of the COVID-19 Pandemic on Learning and Teaching: A Case Study from Higher Education. arXiv."},{"key":"ref_19","unstructured":"Cao, Y., Li, S., Liu, Y., Yan, Z., Dai, Y., Yu, P.S., and Sun, L. (2023). A Comprehensive Survey of AI-Generated Content (AIGC): A History of Generative AI from GAN to ChatGPT. arXiv."},{"key":"ref_20","unstructured":"Mohamadi, S., Mujtaba, G., Le, N., Doretto, G., and Adjeroh, D.A. (2023). ChatGPT in the Age of Generative AI and Large Language Models: A Concise Survey. arXiv."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2711","DOI":"10.1007\/s00607-022-01104-2","article-title":"Edge computing","volume":"104","author":"Berrocal","year":"2022","journal-title":"Computing"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Hasan, B.T., and Idrees, A.K. (2024). Edge Computing for IoT. arXiv.","DOI":"10.1007\/978-3-031-50514-0_1"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Tuli, S., Mirhakimi, F., Pallewatta, S., Casale, G., Javadi, B., Yan, F., Buyya, R., and Jennings, N.R. (2022). AI-Augmented Edge and Fog Computing: Trends and Challenges. arXiv.","DOI":"10.1016\/j.jnca.2023.103648"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s13677-022-00367-6","article-title":"Understanding the challenges and novel architectural models of multi-cloud native applications\u2014A systematic literature review","volume":"12","author":"Alonso","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref_25","first-page":"1","article-title":"The next generation cloud technologies: A review on distributed cloud, fog and edge computing and their opportunities and challenges","volume":"1","author":"Atieh","year":"2021","journal-title":"Res. Berg Rev. Sci. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Somani, U., Kanika, L., and Manish, M. (2010, January 28\u201330). Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. Proceedings of the First International Conference on Parallel, Distributed and Grid Computing (PDGC \u201910), Solan, India.","DOI":"10.1109\/PDGC.2010.5679895"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1007\/s12065-020-00555-w","article-title":"An improved security and privacy management system for data in multi-cloud environments using a hybrid approach","volume":"14","author":"Pachala","year":"2021","journal-title":"Evol. Intell."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"15","DOI":"10.9756\/BIJSESC.9007","article-title":"Provisioning of data security for file transformation on multi-cloud storage","volume":"9","author":"Nandhini","year":"2019","journal-title":"Bonfring Int. J. Softw. Eng. Soft Comput."},{"key":"ref_29","first-page":"6","article-title":"What is \u201cCloud\u201d? It is time to update the NIST definition?","volume":"5","author":"Miyachi","year":"2018","journal-title":"IEEE Cloud Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1504\/IJCAET.2020.110481","article-title":"A cloud broker architecture for cloud service selection based on multi-criteria decision making and rough set theory","volume":"13","author":"Talbi","year":"2020","journal-title":"Int. J. Comput. Aided Eng. Technol."},{"key":"ref_31","unstructured":"Software Development Company USA (2025, June 28). Simform. Available online: http:\/\/www.simform.com\/."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","article-title":"Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing","volume":"98","author":"Fu","year":"2015","journal-title":"IEICE Trans. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.compind.2016.09.001","article-title":"Engineering of secure multi-cloud storage","volume":"83","author":"Junghanns","year":"2016","journal-title":"Comput. Ind."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Das, S., and Abbadi, A.E. (2011, January 21\u201324). Big data and cloud computing: Current state and future opportunities. Proceedings of the 14th International Conference on Extending Database Technology (EDBT\/ICDT \u201911), Uppsala, Sweden.","DOI":"10.1145\/1951365.1951432"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zardari, M., Low, T., and Zakaria, M. (2013, January 23\u201324). Hybrid Multi-cloud Data Security (HMCDS) Model and Data Classification. Proceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT \u201913), Kuching, Malaysia.","DOI":"10.1109\/ACSAT.2013.40"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/s42979-020-00277-x","article-title":"Hybrid IT and Multi Cloud an Emerging Trend and Improved Performance in Cloud Computing","volume":"1","author":"Gundu","year":"2020","journal-title":"SN Comput. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"103441","DOI":"10.1016\/j.autcon.2020.103441","article-title":"Cloud computing in construction industry: Use cases, benefits and challenges","volume":"122","author":"Bello","year":"2021","journal-title":"Autom. Constr."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1016\/j.future.2010.03.009","article-title":"Toward dynamic and attribute based publication, discovery and selection for cloud computing","volume":"26","author":"Goscinski","year":"2010","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MIC.2010.113","article-title":"Cloud computing: The new frontier of internet computing","volume":"14","author":"Pallis","year":"2010","journal-title":"IEEE Internet Comput."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.mcm.2010.03.037","article-title":"Identification of a company\u2019s suitability for the adoption of cloud computing and modelling its corresponding return on investment","volume":"53","author":"Misra","year":"2011","journal-title":"Math. Comput. Model."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"Armbrust","year":"2010","journal-title":"Commun. ACM"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1108\/17410391011019732","article-title":"It\u2019s written in the cloud: The hype and promise of cloud computing","volume":"23","author":"Sharif","year":"2010","journal-title":"J. Enterp. Inf. Manag."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Voorsluys, W., Broberg, J., Venugopal, S., and Buyya, R. (2009, January 1\u20134). Cost of virtual machine live migration in clouds: A performance evaluation. Proceedings of the 1st International Conference on Cloud Computing, Beijing, China.","DOI":"10.1007\/978-3-642-10665-1_23"},{"key":"ref_44","first-page":"109","article-title":"Cloud computing for education: A new dawn?","volume":"30","author":"Sultan","year":"2010","journal-title":"Int. J. Inf. Manag."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Banyal, R.K., Jain, V.K., and Jain, P. (2014, January 14\u201316). Dynamic Trust Based Access Control Framework for Securing Multi-Cloud Environment. Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies (ICTCS \u201914), Udaipur Rajasthan, India.","DOI":"10.1145\/2677855.2677884"},{"key":"ref_46","unstructured":"Takabi, D., Joshi, J., and Ahn, G.J. (2010, January 19\u201323). SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. Proceedings of the International Computer Software and Applications Conference (COMPSACW \u201910), Seoul, Republic of Korea."},{"key":"ref_47","unstructured":"Alliance, C.S. (2025, November 20). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Available online: https:\/\/www.researchgate.net\/publication\/356433278_Security_guidance_for_critical_areas_of_focus_in_cloud_computing_v30; also available: https:\/\/cloudsecurityalliance.org\/artifacts\/security-guidance-for-critical-areas-of-focus-in-cloud-computing-v3#."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s10207-012-0179-0","article-title":"A framework for establishing trust in Cloud provenance","volume":"12","author":"Abbadi","year":"2013","journal-title":"Int. J. Inf. Secur."},{"key":"ref_49","first-page":"600","article-title":"Multi-cloud Strategies for Distributed AI Workflows and Application","volume":"10","author":"Sekar","year":"2023","journal-title":"J. Emerg. Technol. Innov. Res."},{"key":"ref_50","unstructured":"NIST (2011). The NIST Definition of Cloud Computing, National Institute of Standards and Technology. Special Publication 800-145."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","article-title":"Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility","volume":"25","author":"Buyya","year":"2009","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_52","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., and Stoica, I. (2009). Above the Clouds: A Berkeley View of Cloud Computing, University of California. Technical Report UCB\/EECS-2009-28."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","article-title":"Cloud computing\u2014The business perspective","volume":"51","author":"Marston","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_54","first-page":"1","article-title":"The Role of Cloud Computing in Driving Business Innovation","volume":"6","author":"Adabala","year":"2020","journal-title":"Int. J. Innov. Res. Creat. Technol."},{"key":"ref_55","unstructured":"Zawoad, S., and Hasan, R. (2013). Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Yeboah-Ofori, A., Jafar, A., Abisogun, T., Hilton, I., Oseni, W., and Musa, A. (2024, January 19\u201321). Data Security and Governance in Multi-Cloud Computing Environment. Proceedings of the 11th International Conference on Future Internet of Things and Cloud (FiCloud \u201924), Vienna, Austria.","DOI":"10.1109\/FiCloud62933.2024.00040"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"178825","DOI":"10.1109\/ACCESS.2020.3026875","article-title":"Energy-Aware Task Allocation for Multi-Cloud Networks","volume":"8","author":"Mishra","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Mavrogeorgi, N., Gogouvitis, S., Voulodimos, A., Kiriazis, D., Varvarigou, T., Shulman-Peleg, A., and Kolodner, E.K. (July, January 28). Dynamic Rule-Based SLA Management in Clouds. Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD \u201913), Santa Clara, CA, USA.","DOI":"10.1109\/CLOUD.2013.61"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1109\/TSC.2014.2381227","article-title":"Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment","volume":"8","author":"Lin","year":"2014","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.procs.2016.08.281","article-title":"Multi-cloud Platform-as-a-service Model, Functionalities and Approaches","volume":"97","author":"Ferrer","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1556154.1556173","article-title":"Trusting the cloud","volume":"40","author":"Cachin","year":"2009","journal-title":"SIGACT News"},{"key":"ref_62","first-page":"2600712","article-title":"Multi-Cloud Integration Security Framework Using Honeypots","volume":"2022","author":"Alyas","year":"2022","journal-title":"Mob. Inf. Syst."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Gonzalez, A.E., and Arzuaga, E. (2020, January 10\u201313). HerdMonitor: Monitoring Live Migrating Containers in Cloud Environments. Proceedings of the 2020 IEEE International Conference on Big Data (BigData \u201920), Atlanta, GA, USA.","DOI":"10.1109\/BigData50022.2020.9378473"},{"key":"ref_64","unstructured":"James, W. (2025, November 20). AI-Powered Threat Detection in Hybrid and Multi-Cloud Environments: Overcoming Security Challenges. Available online: https:\/\/www.researchgate.net\/publication\/384935856_AI-Powered_Threat_Detection_in_Hybrid_and_Multi-Cloud_Environments_Overcoming_Security_Challenges."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"113165","DOI":"10.1016\/j.eswa.2019.113165","article-title":"Modeling and solving cloud service purchasing in multi-cloud environments","volume":"147","author":"Heilig","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Hoffa, C., Mehta, G., Freeman, T., Deelman, E., Keahey, K., Berriman, B., and Good, J. (2008, January 7\u201312). On the use of cloud computing for scientific workflows. Proceedings of the Fourth IEEE International Conference on eScience (eScience \u201908), Indianapolis, IN, USA.","DOI":"10.1109\/eScience.2008.167"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Tuli, S., Mahmud, R., Tuli, S., and Buyya, R. (2021). Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control. Electronics, 10.","DOI":"10.3390\/electronics10101171"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TCC.2015.2453945","article-title":"A Multi-Layered Scheme for Distributed Simulations on the Cloud Environment","volume":"7","author":"Guan","year":"2019","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/j.procs.2015.04.011","article-title":"Securing Multi-cloud Using Secret Sharing Algorithm","volume":"50","author":"Muhil","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","article-title":"Securing Ad Hoc Networks","volume":"13","author":"Zhou","year":"1999","journal-title":"IEEE Netw."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1186\/s13677-019-0143-x","article-title":"Multi-cloud provisioning of business processes","volume":"8","author":"Kritikos","year":"2019","journal-title":"J. Cloud Comput."},{"key":"ref_72","unstructured":"(2025, June 28). Journal of Cloud Computing. Available online: https:\/\/journalofcloudcomputing.springeropen.com\/."},{"key":"ref_73","first-page":"104","article-title":"Multi-Cloud DevOps Strategies: A Framework for Agility and Cost Optimization","volume":"7","author":"Pochu","year":"2024","journal-title":"J. Artif. Intell. Gen. Sci."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Seth, D., Nerella, H., Najana, M., and Tabbassum, A. (2024). Navigating the Multi-Cloud Maze: Benefits, Challenges, and Future Trends. Int. J. Glob. Innov. Solut. (IJGIS).","DOI":"10.21428\/e90189c8.8c704fe4"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Abu-Libdeh, H., Princehouse, L., and Weatherspoon, H. (2010, January 10\u201311). RACS: A case for cloud storage diversity. Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC \u201910), Indianapolis, IN, USA.","DOI":"10.1145\/1807128.1807165"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2535929","article-title":"DepSky: Dependable and Secure Storage in a Cloud-of-Clouds","volume":"9","author":"Bessani","year":"2013","journal-title":"ACM Trans. Storage"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., and Oprea, A. (2009, January 9\u201313). HAIL: A high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS \u201909), Chicago, IL, USA.","DOI":"10.1145\/1653662.1653686"},{"key":"ref_78","unstructured":"Cachin, C., Haas, R., and Vukolic, M. (2025, July 16). Dependable Storage in the Intercloud, Available online: https:\/\/www.researchgate.net\/publication\/288925333_Dependable_storage_in_the_Intercloud\/citation\/download."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1186\/s13673-020-00224-y","article-title":"Ensuring User Authentication and Data Integrity in Multi-Cloud Environment","volume":"10","author":"Megouache","year":"2020","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref_80","unstructured":"Reece, M., Lander, T.E., Stoffolano, M., Sampson, A., Dykstra, J., Mittal, S., and Rastogi, N. (2023). Systemic Risk and Vulnerability Analysis of Multi-cloud Environments. arXiv."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Afolaranmi, S.O., Ferrer, B.R., and Martinez Lastra, J.L. (2018, January 21\u201323). A Framework for Evaluating Security in Multi-Cloud Environments. Proceedings of the 44th Annual Conference of the IEEE Industrial Electronics Society (IECON \u201918), Washington, DC, USA.","DOI":"10.1109\/IECON.2018.8591454"},{"key":"ref_82","unstructured":"Lander, T.E. (2024). Multi-Cloud Architecture Attacks Through Application Programming Interfaces. [Master\u2019s Thesis, Mississippi State University]."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"147420","DOI":"10.1109\/ACCESS.2019.2946185","article-title":"Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"108439","DOI":"10.1016\/j.asoc.2022.108439","article-title":"Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach","volume":"118","author":"Gupta","year":"2022","journal-title":"Appl. Soft Comput."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Salman, T., Bhamare, D., Erbad, A., Jain, R., and Samaka, M. (2017, January 26\u201328). Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments. Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud \u201917), New York, NY, USA.","DOI":"10.1109\/CSCloud.2017.15"},{"key":"ref_86","first-page":"335","article-title":"Performance and Information Security Evaluation with Firewalls","volume":"7","author":"Hayajneh","year":"2013","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_87","first-page":"248","article-title":"A Review on Security Issues in Multi Cloud Computing and Prevention by Security Measures","volume":"13","author":"Binu","year":"2023","journal-title":"Int. J. Sci. Res. Publ."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Reece, M., Rastogi, N., Lander, T., Dykstra, J., Mittal, S., and Sampson, A. (2024, January 15\u201317). Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024), San Antonio, TX, USA.","DOI":"10.1145\/3649158.3657051"},{"key":"ref_89","first-page":"40","article-title":"On the Evolution of Virtualization and Cloud Computing: A Review","volume":"2","author":"Awodele","year":"2014","journal-title":"J. Comput. Sci. Appl."},{"key":"ref_90","unstructured":"Kilari, N., and Sridaran, R. (2021). A Survey on Security Threats for Cloud Computing. Int. J. Eng. Res. Technol. (IJERT), 1."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"102124","DOI":"10.1016\/j.cose.2020.102124","article-title":"Continuous auditing and threat detection in multi-cloud infrastructure","volume":"102","author":"Torkura","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_92","unstructured":"Cloud Security Alliance (CSA) (2019). Top Threats to Cloud Computing: The Egregious 11, Cloud Security Alliance. Technical Report."},{"key":"ref_93","unstructured":"Trend Micro (2025, July 16). Data on 123 Million US Households Exposed Due to Misconfigured AWS S3 Bucket. Available online: https:\/\/www.trendmicro.com\/vinfo\/au\/security\/news\/virtualization-and-cloud\/data-on-123-million-us-households-exposed-due-to-misconfigured-aws-s3-bucket."},{"key":"ref_94","unstructured":"UpGuard (2025, November 20). Data Leaks, Cyber Risk, and eStar. Available online: https:\/\/www.upguard.com\/breaches\/cloud-leak-alteryx."},{"key":"ref_95","unstructured":"Kincaid, J. (2025, July 16). Google Privacy Blunder Shares Your Docs Without Permission. Available online: http:\/\/techcrunch.com\/2009\/03\/07\/huge-google-privacy-blunder-shares-your-docs-without-permission\/."},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L.L. (2011, January 4\u20139). Security Prospects through Cloud Computing by Adopting Multiple Clouds. Proceedings of the IEEE 4th International Conference on Cloud Computing (CLOUD), Washington, DC, USA.","DOI":"10.1109\/CLOUD.2011.85"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. (2009, January 9\u201313). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS \u201909), Chicago, IL, USA.","DOI":"10.1145\/1653662.1653687"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Gruschka, N., and Iacono, L.L. (2009, January 6\u201310). Vulnerable Cloud: SOAP Message Security Validation Revisited. Proceedings of the 2009 IEEE International Conference on Web Services (ICWS \u201909), Los Angeles, CA, USA.","DOI":"10.1109\/ICWS.2009.70"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"McIntosh, M., and Austel, P. (2005, January 11). XML Signature Element Wrapping Attacks and Countermeasures. Proceedings of the 2005 Workshop on Secure Web Services (SWS \u201905), Fairfax, VA, USA.","DOI":"10.1145\/1103022.1103026"},{"key":"ref_100","unstructured":"Ponemon, I. (2025, November 20). Cost of a Data Breach Report; Benchmark Research Sponsored by IBM Security Independently Conducted by Ponemon Institute LLC; 2019. Available online: https:\/\/insights.integrity360.com\/hubfs\/2019-cost-of-a-data-breach-report-04_03025203USEN.pdf."},{"key":"ref_101","first-page":"51","article-title":"Enhancing Security and Privacy in Multi-Cloud Environments: A Comprehensive Study on Encryption Techniques and Access Control Mechanisms","volume":"12","author":"Mohammad","year":"2021","journal-title":"Int. J. Comput. Eng. Technol."},{"key":"ref_102","unstructured":"Caprolu, M., Raponi, S., Oligeri, G., and Di Pietro, R. (2020). Cryptomining Makes Noise: A Machine Learning Approach for Cryptojacking Detection. arXiv."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Jayasinghe, K., and Guhanathan, P. (2020, January 22\u201324). A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure. Proceedings of the 2020 2nd International Conference on Cloud Computing and Internet of Things (CCIOT 2020), Singapore.","DOI":"10.1145\/3379310.3379323"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., and Selcuk, A.A. (2021). SoK: Cryptojacking Malware. arXiv.","DOI":"10.1109\/EuroSP51992.2021.00019"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","article-title":"DDoS Attacks in Cloud Computing: Issues, Taxonomy and Future Directions","volume":"107","author":"Somani","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Dorsett, M., Mann, S., Chowdhury, J., and Mahmood, A. (2025). A Comprehensive Review of Denial of Wallet Attacks in Serverless Architectures. arXiv.","DOI":"10.2139\/ssrn.5350294"},{"key":"ref_107","first-page":"e2","article-title":"Attribution of Economic Denial of Sustainability Attacks in Public Clouds","volume":"4","author":"Karami","year":"2018","journal-title":"EAI Endorsed Trans. Secur. Saf."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s43926-025-00183-9","article-title":"Enhancing Public Cloud Resilience: An Analytical Review of Detection and Mitigation Strategies Against Economic Denial of Sustainability Attacks","volume":"5","author":"Saeed","year":"2025","journal-title":"Discov. Internet Things"},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.21917\/ijct.2016.0207","article-title":"Economic Denial of Sustainability (EDoS) Attack on Cloud\u2014A Survey","volume":"7","author":"Somasundaram","year":"2016","journal-title":"ICTACT J. Commun. Technol."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Aldhyani, T.H.H., and Alkahtani, H. (2022). Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors, 22.","DOI":"10.3390\/s22134685"},{"key":"ref_111","unstructured":"Frie\u00df, J., Gattermayer, T., Gelernter, N., Schulmann, H., and Waidner, M. (2024). Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. arXiv."},{"key":"ref_112","unstructured":"Pansy (2025, July 16). 80+ Cloud Security Statistics to Know for 2024. Available online: https:\/\/sprinto.com\/blog\/cloud-security-statistics\/."},{"key":"ref_113","unstructured":"IBM (2025, November 20). Cost of a Data Breach 2024. Available online: https:\/\/www.ibm.com\/reports\/data-breach."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","article-title":"A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies","volume":"9","author":"Alouffi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1080\/19331680802425479","article-title":"Cloud Computing and Information Policy: Computing in a Policy Cloud?","volume":"5","author":"Jaeger","year":"2008","journal-title":"J. Inf. Technol. Politics"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Sasubilli, M.K., and Venkateswarlu, R. (2021, January 20\u201322). Cloud Computing Security Challenges, Threats and Vulnerabilities. Proceedings of the 6th International Conference on Inventive Computation Technologies (ICICT \u201921), Coimbatore, India.","DOI":"10.1109\/ICICT50816.2021.9358709"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(16)30056-3","article-title":"What the GDPR Means for Businesses","volume":"2016","author":"Tankard","year":"2016","journal-title":"Netw. Secur."},{"key":"ref_118","unstructured":"European Union (2025, November 20). General Data Protection Regulation (GDPR). Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"ref_119","unstructured":"Cloud Security Alliance (CSA) (2018). State of Cloud Report, Cloud Security Alliance. Available online: https:\/\/cloudsecurityalliance.org\/artifacts\/state-of-cloud-report."},{"key":"ref_120","unstructured":"NetDiligence (2025, November 20). Cyber Claims Study 2020 Report. Available online: https:\/\/netdiligence.com\/cyber-claims-study-2020-report\/."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"20358","DOI":"10.48084\/etasr.8918","article-title":"Hierarchical Deep Learning for Robust Cybersecurity in Multi-Cloud Healthcare Infrastructures","volume":"15","author":"Ali","year":"2025","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_122","unstructured":"Choi, S.J., and Johnson, M.E. (2019). Do Hospital Data Breaches Reduce Patient Care Quality?. arXiv."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1017\/S1816383122000194","article-title":"The SolarWinds Hack: Lessons for International Humanitarian Organizations","volume":"104","author":"Marelli","year":"2022","journal-title":"Int. Rev. Red Cross"},{"key":"ref_124","unstructured":"Jones, J., Smith, B., Micheal, O., Barnes, M., and Adebayo, H. (2025). Revolutionizing Cybersecurity with AI-Driven SIEM: Optimizing Threat Detection in Multi-Cloud Environments, unpublished manuscript."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"2513","DOI":"10.1007\/s11276-024-03890-3","article-title":"Double Fuzzy Clustering-Driven Context Neural Network for Intrusion Detection in Cloud Computing","volume":"31","author":"Velavan","year":"2025","journal-title":"Wirel. Netw."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"94","DOI":"10.58496\/BJIoT\/2024\/012","article-title":"Evaluating the Effectiveness of Machine Learning-Based Intrusion Detection in Multi-Cloud Environments","volume":"2024","author":"Masoodi","year":"2024","journal-title":"Babylon. J. Internet Things"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/s10723-023-09727-1","article-title":"Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms","volume":"22","author":"Mitropoulou","year":"2024","journal-title":"J. Grid Comput."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Fatani, A., Dahou, A., Abd Elaziz, M., Al-qaness, M.A.A., Lu, S., Alfadhli, S.A., and Alresheedi, S.S. (2023). Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks. Sensors, 23.","DOI":"10.3390\/s23094430"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Alzughaibi, S., and El Khediri, S. (2023). A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset. Appl. Sci., 13.","DOI":"10.3390\/app13042276"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., and Almusallam, N. (2023). Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing. Appl. Sci., 13.","DOI":"10.3390\/app13179588"},{"key":"ref_131","first-page":"751","article-title":"Design of Intrusion Detection System using Ensemble Learning Technique in Cloud Computing Environment","volume":"14","author":"Bingu","year":"2023","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.dcan.2022.09.021","article-title":"Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine","volume":"9","author":"Lin","year":"2023","journal-title":"Digit. Commun. Netw."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1186\/s13677-023-00509-4","article-title":"Intelligent intrusion detection framework for multi-clouds\u2013IoT environment using swarm-based deep learning classifier","volume":"12","author":"Nizamudeen","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1186\/s13677-022-00329-y","article-title":"Cloud-based multiclass anomaly detection and categorization using ensemble learning","volume":"11","author":"Shahzad","year":"2022","journal-title":"J. Cloud Comput."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"100612","DOI":"10.1016\/j.measen.2022.100612","article-title":"Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods","volume":"25","author":"Samunnisa","year":"2023","journal-title":"Meas. Sens."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.future.2019.03.043","article-title":"A Deep Learning Approach for Proactive Multi-Cloud Cooperative Intrusion Detection System","volume":"98","author":"Abusitta","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_137","first-page":"379","article-title":"Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape","volume":"16","author":"Achar","year":"2022","journal-title":"Int. J. Comput. Syst. Eng."},{"key":"ref_138","unstructured":"Deepa, T., and Kiran Mayee, M. (2017). Cloud Computing: Security and Privacy Issues. Int. J. Trend Res. Dev. (IJTRD), Available online: http:\/\/www.ijtrd.com\/papers\/IJTRD13397.pdf."},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Razaque, A., Nadimpalli, S.S.V., Vommina, S., Atukuri, D.K., Reddy, D.N., Anne, P., Vegi, D., and Malllapu, V.S. (2016, January 3\u20135). Secure Data Sharing in Multi-Clouds. Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India.","DOI":"10.1109\/ICEEOT.2016.7755020"},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Rodigari, S., O\u2019Shea, D., McCarthy, P., McCarry, M., and McSweeney, S. (2021, January 5\u201310). Performance Analysis of Zero-Trust Multi-Cloud. Proceedings of the 14th IEEE International Conference on Cloud Computing (CLOUD \u201921), Chicago, IL, USA.","DOI":"10.1109\/CLOUD53861.2021.00097"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TCC.2018.2849699","article-title":"Multi-Cloud Performance and Security Driven Federated Workflow Management","volume":"9","author":"Dickinson","year":"2021","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Kurdi, H., Alsalamah, S., Alatawi, A., Alfaraj, S., Altoaimy, L., and Ahmed, S.H. (2019). HealthyBroker: A Trustworthy Blockchain-Based Multi-Cloud Broker for Patient-Centered eHealth Services. Electronics, 8.","DOI":"10.3390\/electronics8060602"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.comnet.2019.06.004","article-title":"Secure Multi-Cloud Network Virtualization","volume":"161","author":"Alaluna","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Shirvani, M.H. (2018, January 3\u20135). Web Service Composition in Multi-Cloud Environment: A Bi-Objective Genetic Optimization Algorithm. Proceedings of the 2018 Innovations in Intelligent Systems and Applications (INISTA \u201918), Thessaloniki, Greece.","DOI":"10.1109\/INISTA.2018.8466267"},{"key":"ref_145","first-page":"176","article-title":"Enhanced Security for Data Sharing in Multi Cloud Storage (SDSMC)","volume":"8","author":"Subramanian","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.procs.2016.07.375","article-title":"Trusted and Reputed Services Using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud","volume":"92","author":"Sarojini","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.procs.2015.04.035","article-title":"Preserving Data Confidentiality Using Multi-cloud Architecture","volume":"50","author":"Sulochana","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.knosys.2014.07.018","article-title":"A Novel Trust Management Framework for Multi-Cloud Environments Based on Trust Service Providers","volume":"70","author":"Fan","year":"2014","journal-title":"Knowl.-Based Syst."},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1016\/j.procs.2015.02.127","article-title":"Enhanced Attribute Based Encryption for Cloud Computing","volume":"46","author":"Kumar","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Alhamazani, K., Ranjan, R., Mitra, K., Jayaraman, P.P., Huang, Z., Wang, L., and Rabhi, F. (July, January 27). CLAMS: Cross-layer Multi-cloud Application Monitoring-as-a-Service Framework. Proceedings of the 2014 IEEE International Conference on Services Computing (SCC \u201914), Anchorage, AK, USA.","DOI":"10.1109\/SCC.2014.45"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5171\/2013.462966","article-title":"Enhancing Data Privacy and Access Anonymity in Cloud Computing","volume":"2013","author":"Giweli","year":"2013","journal-title":"Commun. IBIMA"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/TPDS.2013.246","article-title":"HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications","volume":"26","author":"Dou","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"5173","DOI":"10.1007\/s00500-023-09201-w","article-title":"Reliability-aware web service composition with cost minimization perspective: A multi-objective particle swarm optimization model in multi-cloud scenarios","volume":"28","author":"Tabalvandani","year":"2024","journal-title":"Soft Comput."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"2909","DOI":"10.1109\/TCC.2021.3057422","article-title":"Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems","volume":"10","author":"Tang","year":"2022","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_155","doi-asserted-by":"crossref","unstructured":"Wojtowicz, D.T., Yin, S., Morvan, F., and Hameurlain, A. (2021, January 5\u201310). Cost-Effective Dynamic Optimisation for Multi-Cloud Queries. Proceedings of the 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA.","DOI":"10.1109\/CLOUD53861.2021.00052"},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"51","DOI":"10.31577\/cai_2020_1-2_51","article-title":"Optimizing Data Placement for Cost Effective and High Available Multi-Cloud Storage","volume":"39","author":"Wang","year":"2020","journal-title":"Comput. Inform."},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Gao, T., Wu, C.Q., Hou, A., Wang, Y., Li, R., and Xu, M. (2019, January 8\u201312). Minimizing Financial Cost of Scientific Workflows under Deadline Constraints in Multi-Cloud Environments. Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (SAC \u201919), Limassol, Cyprus.","DOI":"10.1145\/3297280.3297293"},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Peralta, G., Garrido, P., Bilbao, J., Ag\u00fcero, R., and Crespo, P.M. (2019). On the Combination of Multi-Cloud and Network Coding for Cost-Efficient Storage in Industrial Applications. Sensors, 19.","DOI":"10.3390\/s19071673"},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Wang, P., Zhao, C., and Zhang, Z. (2018, January 27\u201329). An Ant Colony Algorithm-Based Approach for Cost-Effective Data Hosting with High Availability in Multi-Cloud Environments. Proceedings of the 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), Zhuhai, China.","DOI":"10.1109\/ICNSC.2018.8361288"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"4717","DOI":"10.1007\/s11227-018-2465-8","article-title":"Integer Linear Programming-based Cost Optimization for Scheduling Scientific Workflows in Multi-cloud Environments","volume":"74","author":"Mohammadi","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/TCC.2015.2417534","article-title":"CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability","volume":"3","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Imai, S., Patterson, S., and Varela, C.A. (2015, January 4\u20137). Cost-Efficient High-Performance Internet-Scale Data Analytics over Multi-Cloud Environments. Proceedings of the 2015 15th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Shenzhen, China.","DOI":"10.1109\/CCGrid.2015.158"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.1002\/cpe.2972","article-title":"Cost optimization of virtual infrastructures in dynamic multi-cloud scenarios","volume":"27","author":"Montero","year":"2015","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"ref_164","doi-asserted-by":"crossref","unstructured":"Bellur, U., Malani, A., and Narendra, N.C. (July, January 27). Cost Optimization in Multi-site Multi-cloud Environments with Multiple Pricing Schemes. Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing (CLOUD), Anchorage, AK, USA.","DOI":"10.1109\/CLOUD.2014.97"},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Legillon, F., Melab, N., Renard, D., and Talbi, E.G. (2013, January 20\u201323). Cost Minimization of Service Deployment in a Multi-Cloud Environment. Proceedings of the 2013 IEEE Congress on Evolutionary Computation (CEC), Cancun, Mexico.","DOI":"10.1109\/CEC.2013.6557880"},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Singh, Y., Kandah, F., and Zhang, W. (2011, January 10\u201315). A Secured Cost-Effective Multi-Cloud Storage in Cloud Computing. Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China.","DOI":"10.1109\/INFCOMW.2011.5928887"},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Simarro, J.L.L., Moreno-Vozmediano, R., Montero, R.S., and Llorente, I.M. (2011, January 4\u20138). Dynamic Placement of Virtual Machines for Cost Optimization in Multi-Cloud Environments. Proceedings of the 2011 International Conference on High Performance Computing & Simulation (HPCSim), Istanbul, Turkey.","DOI":"10.1109\/HPCSim.2011.5999800"},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Frincu, M.E., and Craciun, C. (2011, January 5\u20138). Multi-objective Meta-heuristics for Scheduling Applications with High Availability Requirements and Cost Constraints in Multi-Cloud Environments. Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), Melbourne, VIC, Australia.","DOI":"10.1109\/UCC.2011.43"},{"key":"ref_169","first-page":"81","article-title":"Data Security and Privacy Protection Issues in Cloud Computing: A Survey","volume":"4","author":"Gholami","year":"2017","journal-title":"Int. J. Big Data Intell. (IJBDI)"},{"key":"ref_170","first-page":"220","article-title":"Security-by-design in multi-cloud applications: An optimization approach","volume":"462","author":"Casola","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Paul, A.L. (2025, July 27). Security Challenges and Solutions in Multi-Cloud Environments. Available online: https:\/\/www.researchgate.net\/publication\/381074289_Security_Challenges_and_Solutions_in_Multi-Cloud_Environments.","DOI":"10.9790\/0661-2703035354"},{"key":"ref_172","first-page":"3262","article-title":"A Survey of Various Encryption Techniques in Multi Cloud to Reduce Information Leakage","volume":"12","author":"Saini","year":"2024","journal-title":"Int. J. Intell. Syst. Appl. Eng. (IJISAE)"},{"key":"ref_173","doi-asserted-by":"crossref","unstructured":"Tchernykh, A., Babenko, M., Kuchukov, V., Miranda-L\u00f3pez, V., Rivera-Rodriguez, R., Avetisyan, A., and Radchenko, G. (2020, January 3\u20135). Data Reliability and Redundancy Optimization of a Secure Multi-Cloud Storage Under Uncertainty of Errors and Falsifications. Proceedings of the International Conference on Computational Science (ICCS), Amsterdam, The Netherlands.","DOI":"10.1109\/IPDPSW.2019.00099"},{"key":"ref_174","doi-asserted-by":"crossref","first-page":"258","DOI":"10.14445\/22315381\/IJETT-V70I11P228","article-title":"A Hybrid Cryptography Technique for Cloud Data Security","volume":"70","author":"Gadde","year":"2022","journal-title":"Int. J. Eng. Trends Technol. (IJETT)"},{"key":"ref_175","first-page":"7347","article-title":"Enhancing Data Security in Multi-Cloud Settings with Homomorphic Encryption: Concepts, Uses, And Obstacles","volume":"30","author":"Thangavel","year":"2024","journal-title":"Educ. Adm. Theory Pract."},{"key":"ref_176","first-page":"44","article-title":"AI-Driven Security in Cloud Computing: Enhancing Threat Detection, Automated Response, and Cyber Resilience","volume":"6","author":"Shaffi","year":"2024","journal-title":"J. Cybersecur. Artif. Intell."},{"key":"ref_177","first-page":"24","article-title":"AI-Driven Frameworks for Enhancing Cybersecurity in Multi-Cloud Environments","volume":"1","author":"Rasel","year":"2025","journal-title":"Int. J. Adv. Eng. Technol. Innov."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"629","DOI":"10.30574\/wjarr.2022.13.3.0250","article-title":"Enhancing Multi-Cloud Security with Quantum-Resilient AI for Anomaly Detection","volume":"13","author":"Talati","year":"2022","journal-title":"World J. Adv. Res. Rev."},{"key":"ref_179","first-page":"15","article-title":"Challenges and Solutions for Integrating AI with Multi-Cloud Architectures","volume":"1","author":"Nagaraj","year":"2022","journal-title":"Int. J. Multidiscip. Innov. Res. Methodol. (IJMIRM)"},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"143","DOI":"10.14445\/22312803\/IJCTT-V72I11P115","article-title":"Effective Multi Cloud Security Using AI Technologies","volume":"72","author":"Miryala","year":"2024","journal-title":"Int. J. Comput. Trends Technol. (IJCTT)"},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"20717","DOI":"10.1109\/ACCESS.2021.3054129","article-title":"Machine Learning for Cloud Security: A Systematic Review","volume":"9","author":"Nassif","year":"2021","journal-title":"IEEE Access"},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Qayyum, A., Qadir, J., Al-Fuqaha, A., Imran, M.A., and Krichen, M. (2020). Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security. Front. Big Data, 3.","DOI":"10.3389\/fdata.2020.587139"},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"Butt, U.A., Afzal, S., Asif, H., Khalil, I., and Halim, Z. (2020). A Review of Machine Learning Algorithms for Cloud Computing Security. Electronics, 9.","DOI":"10.3390\/electronics9091379"},{"key":"ref_184","first-page":"233","article-title":"Securing Multi-Cloud Architectures: A Machine Learning Perspective","volume":"2","author":"Mamidi","year":"2024","journal-title":"J. Artif. Intell. Gen. Sci. (JAIGS)"},{"key":"ref_185","first-page":"551","article-title":"Machine Learning for Intrusion Detection in Cloud Environments: A Comparative Study","volume":"6","author":"Ahmed","year":"2024","journal-title":"J. Artif. Intell. Gen. Sci. (JAIGS)"},{"key":"ref_186","first-page":"230","article-title":"A Fuzzy Approach to Fault Tolerant in Cloud using the Checkpoint Migration Technique","volume":"8","author":"Hagshenas","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_187","first-page":"168","article-title":"A Fuzzy Energy and Security Aware Scheduling in Cloud","volume":"6","author":"Swamy","year":"2018","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_188","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/6629449","article-title":"Fuzzy Rule-Based Trust Management Model for the Security of Cloud Computing","volume":"2021","author":"Soleymani","year":"2021","journal-title":"Math. Probl. Eng."},{"key":"ref_189","doi-asserted-by":"crossref","first-page":"6152","DOI":"10.35940\/ijrte.C5429.098319","article-title":"Cloud Security Risk Analysis Method based on Fuzzy Logic","volume":"8","author":"Sharmila","year":"2019","journal-title":"Int. J. Recent Technol. Eng. (IJRTE)"},{"key":"ref_190","first-page":"3629","article-title":"An Analysis of the Application of Fuzzy Logic in Cloud Computing","volume":"41","author":"Tariq","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_191","first-page":"868","article-title":"Applications of Fuzzy Logic in Cloud Computing: A Review","volume":"6","author":"Chopra","year":"2017","journal-title":"Int. J. Sci. Res. Eng. Technol. (IJSRET)"},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"341","DOI":"10.12785\/ijcds\/090301","article-title":"A Self-Adaptive Resource Provisioning Approach using Fuzzy Logic for Cloud-Based Applications","volume":"9","author":"Mateen","year":"2020","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"ref_193","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s42400-022-00112-1","article-title":"Identifying High-Risk Over-Entitlement in Access Control Policies Using Fuzzy Logic","volume":"5","author":"Parkinson","year":"2022","journal-title":"Cybersecurity"},{"key":"ref_194","unstructured":"Alqahtani, S. (2021). Cloud Intrusion Detection Systems: Fuzzy Logic and Classifications. [Ph.D. Dissertation, University of Nottingham]."},{"key":"ref_195","doi-asserted-by":"crossref","unstructured":"Hersyah, M.H., Hossain, M.D., Taenaka, Y., and Kadobayashi, Y. (2025). Fuzzyfortify: A Multi-Attribute Risk Assessment for Multi-Factor Authentication and Cloud Container Orchestration. Front. Comput. Sci., 7.","DOI":"10.3389\/fcomp.2025.1557918"},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"245","DOI":"10.54660\/.IJMRGE.2025.6.2.245-252","article-title":"Identity and Access Management in Cloud Storage: A Comprehensive Guide","volume":"6","author":"Ike","year":"2025","journal-title":"Int. J. Multidiscip. Res. Growth Eval."},{"key":"ref_197","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., and Belmerabet, I. (2024, January 8\u201310). Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID. Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT), Dijon, France.","DOI":"10.5220\/0012719900003767"},{"key":"ref_198","unstructured":"Barker, N., Hughes, O., Warren, R., and James, A. (2025, November 20). Identity and Access Management (IAM) for Microservices in Multi-Cloud. Available online: https:\/\/www.researchgate.net\/publication\/392163648."},{"key":"ref_199","first-page":"36","article-title":"Multi-Cloud IAM Strategies for Fleet Management: Ensuring Data Security Across Platforms","volume":"7","author":"Khambam","year":"2023","journal-title":"J. Adv. Res. Cloud Comput."},{"key":"ref_200","first-page":"135","article-title":"Zero Trust Identity and Access Management (IAM) in Multi-Cloud Environments","volume":"3","author":"Sivaraman","year":"2023","journal-title":"ESP J. Eng. Technol. Adv."},{"key":"ref_201","first-page":"14","article-title":"Securing Multi-Cloud Environments with SAP BTP, AI, and IAM: A Comprehensive Approach","volume":"16","author":"Akuthota","year":"2025","journal-title":"Int. J. Sci. Technol. (IJSAT)"},{"key":"ref_202","unstructured":"Peter, H. (2025, November 20). Emerging Threats and Best Practices in Cloud Security: Protecting Data in Multi-Cloud Environments. University of Belgrade. Available online: https:\/\/www.researchgate.net\/publication\/392195015_Emerging_Threats_and_Best_Practices_in_Cloud_Security_Protecting_Data_in_Multi-Cloud_Environments."},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"64","DOI":"10.33005\/itij.v2i2.30","article-title":"Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation: A Focus on Security and Data Management","volume":"2","author":"Aditya","year":"2024","journal-title":"Inf. Technol. Int. J."},{"key":"ref_204","doi-asserted-by":"crossref","unstructured":"Karthick, R. (2025). A Comprehensive Survey on AI-Enabled Cloud Security, DevSecOps, and Scalable Digital Infrastructure. Preprints.","DOI":"10.20944\/preprints202507.1103.v1"},{"key":"ref_205","first-page":"2456","article-title":"Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G Networks: A Comprehensive Survey","volume":"5","author":"Blika","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Brezo\u010dnik, L., Fister, I., and Podgorelec, V. (2018). Swarm Intelligence Algorithms for Feature Selection. Appl. Sci., 8.","DOI":"10.3390\/app8091521"},{"key":"ref_207","doi-asserted-by":"crossref","unstructured":"Varzaneh, Z.A., and Hosseini, S. (2024). An Improved Equilibrium Optimization Algorithm for Feature Selection Problem in Network Intrusion Detection. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-67488-7"},{"key":"ref_208","doi-asserted-by":"crossref","unstructured":"Saheed, Y.K., Usman, A.A., Sukat, F.D., and Abdulrahman, M. (2023). A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the Internet of Things network. Front. Comput. Sci., 5.","DOI":"10.3389\/fcomp.2023.997159"},{"key":"ref_209","first-page":"858","article-title":"Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research","volume":"224","author":"Zhang","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_210","doi-asserted-by":"crossref","first-page":"517","DOI":"10.54660\/.IJMRGE.2025.6.3.517-522","article-title":"Multi-Cloud Collaborative Training for Large-Scale Language Models: Techniques, Challenges, and Privacy Considerations","volume":"6","author":"Tunde","year":"2025","journal-title":"Int. J. Multidiscip. Res. Growth Eval."},{"key":"ref_211","doi-asserted-by":"crossref","first-page":"622","DOI":"10.60087\/jklst.vol2.n3.p622","article-title":"Cloud Security Posture Management: Tools and Techniques","volume":"2","author":"Jimmy","year":"2023","journal-title":"J. Knowl. Learn. Sci. Technol."},{"key":"ref_212","unstructured":"Palo Alto Networks (2025, November 06). Prisma Cloud: Comprehensive CSPM and CNAPP Platform. Available online: https:\/\/www.paloaltonetworks.com\/prisma\/cloud."},{"key":"ref_213","unstructured":"Microsoft Corporation (2025, November 20). Microsoft Defender for Cloud Documentation. Microsoft Learn, Available online: https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/."},{"key":"ref_214","unstructured":"Petty, C. (2025, November 20). 2025 Gartner CNAPP Market Guide: Runtime Visibility is No Longer Optional. Sysdig Blog, Available online: https:\/\/www.sysdig.com\/blog\/2025-gartner-cnapp-market-guide\/."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/548\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T15:30:40Z","timestamp":1764948640000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":214,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["fi17120548"],"URL":"https:\/\/doi.org\/10.3390\/fi17120548","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]}}}