A Proactive Framework for Mitigating Data Breaches in Cloud Computing: Architecture-Agnostic Cybersecurity Strategies and Real-World Validation Models
Vishnupriya S., Monisha M., G. Sugathi, J. Jayasathya, Akshaya V., M. Vineesha
2025
Abstract
As cloud technology transforms the digital infrastructure, the need to protect sensitive data from breaches and exposures has become even more acute. Many of the studies that exist are restricted to theoretical models, proprietary vendor implementations, or post-incident analysis and are often not useful to the operations community. This paper presents an architecture-agnostic proactive framework, for cybersecurity, as a novel solution to some of the most pressing problems in the current relevant literature. This model includes validation methods in the real world, simulation-based attack scenarios, and multi-platform compatibility to improve the dependability of cloud computing. The model presented not only mitigates present vulnerabilities but it also prevents future attack vectors with adaptive threat intelligence and layered security measures. This contributes to the gap between academia and industry in this area, and provides a cost-effective solution that is technically validated for the prevention of data breaches in cloud ecosystems.
DownloadPaper Citation
in Harvard Style
S. V., M. M., Sugathi G., Jayasathya J., V. A. and Vineesha M. (2025). A Proactive Framework for Mitigating Data Breaches in Cloud Computing: Architecture-Agnostic Cybersecurity Strategies and Real-World Validation Models. In Proceedings of the 1st International Conference on Research and Development in Information, Communication, and Computing Technologies - Volume 1: ICRDICCT`25; ISBN 978-989-758-777-1, SciTePress, pages 461-467. DOI: 10.5220/0013867700004919
in Bibtex Style
@conference{icrdicct`2525,
author={Vishnupriya S. and Monisha M. and G. Sugathi and J. Jayasathya and Akshaya V. and M. Vineesha},
title={A Proactive Framework for Mitigating Data Breaches in Cloud Computing: Architecture-Agnostic Cybersecurity Strategies and Real-World Validation Models},
booktitle={Proceedings of the 1st International Conference on Research and Development in Information, Communication, and Computing Technologies - Volume 1: ICRDICCT`25},
year={2025},
pages={461-467},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013867700004919},
isbn={978-989-758-777-1},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 1st International Conference on Research and Development in Information, Communication, and Computing Technologies - Volume 1: ICRDICCT`25
TI - A Proactive Framework for Mitigating Data Breaches in Cloud Computing: Architecture-Agnostic Cybersecurity Strategies and Real-World Validation Models
SN - 978-989-758-777-1
AU - S. V.
AU - M. M.
AU - Sugathi G.
AU - Jayasathya J.
AU - V. A.
AU - Vineesha M.
PY - 2025
SP - 461
EP - 467
DO - 10.5220/0013867700004919
PB - SciTePress