2 PROBLEM STATEMENT
Even though cloud computing becomes more and
more popular, the threats of data breaches and
security vulnerabilities put organization at
considerable risks because proactive, platform
independent security frameworks do not exist. The
solutions currently available are reactive, vendor
specific and inadequately verified under real world
conditions, which results in unaddressed gaps in the
ability to prevent breaches and detect and mitigate
threats. A highly scalable and robust method for
mitigating new threats through both static and
adaptive mitigation strategies is needed that can
manage emerging threats in a growing multitude of
cloud environments.
3 LITERATURE SURVEY
Security issues in cloud computing have been among
the focus of intense study and work in both the
academic and industrial communities in recent years,
especially as a result of the proliferation of the
number of, as well as the sophistication of data
breaches. Gupta et al. (2024) presented the MAIDS
model to detect malicious agents in clouds, and (Zeng
et al. 2024) created an intelligent detector system to
detect malicious agents, however they are not tested
against any large scale deployment. Treatment by the
International Research Journal (2025) and IJCTT
(2025) provided theoretical foundations for data
protection in cloud but did not provide
implementation or scalability statistics.
The study on detailed breach analysis (Cloud
Security Alliance, 2025) (CloudSEK, 2025) also
showed real breaches such as Oracle Cloud, and
highlighted the importance of deploying effective
mitigations. But these works are reactive rather than
preemptive. Similarly, Spin. AI (2025) and UpGuard
(2025) reviewed methods for stopping breeches but
were mostly policy oriented without a lot of the
concrete details necessary to implement.
Intelegain (2024) and SentinelOne (2024) both
listed popular cloud security threats as well as
commonly used threat vectors, provided no tools for
new models of mitigation. Other statistic reports such
as from Spacelift (2025), StrongDM (2025), or
TechTarget (2025), emphasized the increase of
breaches but missed architectural details. The work
of Verizon’s DBIR (2025) did an extensive data-
driven breach analysis but didn’t include any
technical countermeasures into its research.
CISA’s Known Exploited Vulnerabilities (n.d.),
highlighted vulnerabilities among federal systems
but inadequately specified proactive measures. Some
Federal News Network (2025) and Microsoft (2024)
posts recommended adopting multicloud approaches
to security but without vendor-neutral technical
detail. Although Axios (2024) and Business Insider
(2025) reported on industry trends such as Google’s
funding of Wiz, they did not provide empirical
evidence about the effectiveness of security.
Wikipedia articles on Azure, Wiz Inc., Log4Shell,
and confidential computing were used to give
introductory overviews (Wikipedia, 2025). However,
their reliability and depth for academic purposes are
limited. Financial Times (2024) underlined the
financial risks of the migration to the cloud, urging
the relevance of security for economic sustenance.
Finally, Cobalt (2025) and Microsoft (2024) provided
some interesting statistics but did not yet propose
technical \mpara{how it is implemented} means on
how to mitigate such breaches.
This literature reports a critical lacuna: the lack of
integrated, pro-active, and cross-platform
cybersecurity framework, which includes adaptive
threat modeling and real-world validation. This
paper attempts to contribute to fill this gap by
combining technical rigor and empirical
applicability to improve cloud security posture across
architectures.
4 METHODOLOGY
The research methodology for this research project is
expected to develop, implement and evaluate a
preventive, architecture-agnostic cyber security
solution that reduces possibility of data breaches and
vulnerabilities in cloud computing environments.
This methodology incorporates adaptive threat
intelligence, layered security control and validation
through simulation and testbed experimentation to be
effective across diverse cloud platforms.
The research starts with the architectural
modelling of the security framework, and is focussed
initially on the modular approach and platform
independence. The framework is divided into several
security layers such as authentication control,
intrusion detection, data integrity checking and
breach response. All the modules are designed with
open source project and APIs to keep the solution
vendor independent and support both public and
hybrid cloud platforms. For it to work cross-platform
it uses Docker based containerization and Kubernetes
based orchestration and can be easily deployed to the