Data breaches have gained widespread attention as businesses of all sizes become increasingly reliant on digital data, cloud computing, and workforce mobility. Cloud applications reduce costs and improve productivity. But it is equally important to monitor and protect data in a cloud environment. These are the questions that arise how to deal with lost visibility, unmanaged devices, and careless users. This paper explains how cloud access security brokers (CASBs) extend security to cloud applications, awareness for data breaches, providing visibility, threat protection, access control, and compliance. The key characteristics and benefits of cloud access security brokers (CASBs) are visibility, threat protection, access control and compliance are key components of this paper to extend data loss prevention (DLP). There is need to create the architecture of CABs having feature to deal with all types of Data Breaches. The result of the study provided a secure architecture to fulfill the security needs and tracks the complex connections between enterprise infrastructure and its cloud service provider.
Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang, "A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing”, IEEE Xplore,2017
Eduardo B. Fernandez, Nobuka ZU Yoshioka, Hironori Washizaki, "Cloud Access Security Broker (CASB): A Pattern for Secure Access to Cloud Services", 4th Asian Conference on Pattern Languages of Programs (Asianplop 2015)
Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang, "Safebox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications", 2017 International Conference On Security, Pattern Analysis, And Cybernetics, IEEE
Opeyemi Osanaiye, Shuo Chen, Zheng Yan, "From Cloud to Fog Computing: A Review and A Conceptual Live Vm Migration Framework", IEEE, April 12, 2017
Fog Computing and Internet of Things: Extend The Cloud to Where the Things Are, Accessed On Apr. 18, 2017. [Online]. http://Www.Cisco.Com/ C/Dam/En_Us/Solutions/Trends/Iot/Docs/Computing-Overview.Pdf/
N. vurukonda, B. Thirumala Rao, "A Study On Data Storage Security Issues In Cloud Computing",2nd international conference on intelligent computing", Communication & Convergence (ICCC-2016)
Vivek Kumar Prasad, Viraj M Mavawala,"Enhancement in Fiat Shamir Cryptography Algorithm", International Journal of Innovations & Advancement in Computer Science, September 2015.
Preeti Kumari, Parmeet Kaur,"A survey of fault tolerance in cloud computing", Journal of King Saud University - Computer and Information Sciences, October 2018
Nabeel khan a, Adil Al-Yasiri,"Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework" The 2nd International Workshop On Internet of Thing: Networking Applications and Technologies (IOTNAT- 2016)
Tulin Atmaca, Thomas Begin, Alexandre Brandwajn, Hind Castel-Taleb, "Performance Evaluation of Cloud Computing Centers with General Arrivals and Service" IEEE Xplore Digital Library 2016
Shichao Guan, "A Multi-Layered Scheme for Distributed Simulations On the Cloud Environment", IEEE XPLORE,2016
Dan Gonzales, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, Dulani Woods, " Cloud-Trust—A Security Assessment Model for Infrastructure as A Service (Iaas) Clouds", IEEE Transactions On Cloud Computing, volume: 5, issue: 3, July-Sept. 1 2017
Kwang Mong Sim,"Agent-Based Approaches for Intelligent Intercloud Resource Allocation", IEEE Transactions on Cloud Computing ,2018
Blesson Varghese, Massimo Villari , Omer Rana , Philip James , Tejal Shah , Maria Fazio , Rajiv Ranjan, "Realizing Edge Marketplaces: Challenges And Opportunities" Published in: “IEEE Cloud Computing”, volume: 5, issue: 6, Nov./Dec. 2018
P. Ravi Kumar, P.Herbet Raj, P.jeliciana, "Exploring Data Security Issues And Solutions In Cloud Computing", 6th international conference on smart computing and communications, ICSCC 2018.
B. Hari Krishna, Dr.S. Kiran, G. Murali, "Security Issues in Service Model of Cloud Computing Environment", International Conference on Computational Science, 2016.
This work is licensed under a Creative Commons Attribution 4.0 International License.
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.
Submission of the manuscript represents that the manuscript has not been published previously and is not considered for publication elsewhere.