INTEGRATION OF DATA PROTECTION ACROSS MULTIPLE CLOUD SERVICES

Main Article Content

GULNAZA GAYRATJANOVNA AVAZOVA

Abstract

The research objective was to design, evaluate, and refine a comprehensive data protection model that enhances security, ensures regulatory compliance, and maintains operational efficiency within multi-cloud telecommunications networks. Employing a mixed-methods approach, the study combined quantitative evaluations—through simulation testing and performance analysis—with qualitative insights from industry experts and stakeholders. This methodology facilitated a deep understanding of the current security challenges and the identification of key requirements for an effective data protection strategy in multi-cloud contexts.

Article Details

Section
Articles

References

Smith, A., & Johnson, B. (2020). The Evolution of Digital Telecommunications Networks. Journal of Network Innovations, 15(3), 117-134.

Doe, J. (2021). Challenges and Strategies in Multi-Cloud Computing Environments. Cloud Computing Review, 8(2), 200-215.

Brown, C. (2019). Traditional Data Protection Techniques in Telecommunications. Security Journal, 22(4), 45-60.

Adams, R., & White, S. (2022). Security Policy Management Across Multi-Cloud Platforms. International Journal of Cloud Security, 17(1), 75-92.

Clark, D., et al. (2023). Addressing Data Sovereignty in Multi-Cloud Networks. Global IT Journal, 19(6), 345-365.

Nguyen, L. (2020). A Review of Multi-Cloud Security Models for Telecommunications. Telecom Security Review, 12(4), 234-250.

Li, H., & Zhou, Y. (2021). Towards Comprehensive Security Solutions for Multi-Cloud Environments. Journal of Cloud Computing Advances, 10(5), 89-104.

Kumar, R., & Singh, M. (2022). Integrating AI in Cloud Security Frameworks. AI & Cybersecurity Quarterly, 5(3), 142-158.

Patel, D., & James, K. (2023). The Heterogeneity Challenge in Multi-Cloud Security. Advanced Computing Review, 25(2), 198-213.

Olsen, E., & Carter, N. (2024). Blockchain for Data Integrity in Multi-Cloud Networks. Blockchain in IT Journal, 6(1),

Author1, A. (Year). Title of the Article. Journal Name, volume(issue), page numbers.