Advancing Cloud Technology Security: Leveraging High-Level Coding Languages like Python and SQL for Strengthening Security Systems and Automating Top Control Processes
Samuel Oladiipo Olabanji *
Midcontinent Independent System Operator (MISO Energy) (720), City Center Drive, Carmel, Indiana-46032, United States of America.
*Author to whom correspondence should be addressed.
Abstract
In today's dynamic business environment, staying ahead of competitors requires the integration of cutting-edge technologies into organizational processes. Cloud Computing, a transformative technological advancement, offers a promising avenue for achieving operational efficiency and innovation. This paper explores the integration of Cloud Computing with two powerful coding languages, Python and SQL, to enhance cloud security and automate control processes. Cloud Computing's adoption has revolutionized resource management through virtualization and diverse computing models. However, it also introduces security challenges like data breaches and unauthorized access. Python and SQL emerge as essential tools for addressing these challenges and automating various control processes. Python's versatility empowers organizations to establish sophisticated security protocols and automate tasks such as intrusion detection, anomaly detection, real-time monitoring, and computer vision. On the other hand, SQL's role involves automating control processes like resource provisioning, scaling, backup, recovery, access control, and database management.
Integrating Python and SQL offers a holistic approach to cloud security enhancement. However, challenges such as skill set requirements, code quality, integration, maintenance, scalability, monitoring, and data privacy must be addressed. Fortunately, solutions like Snowpark, dbt, Hex, and Dataiku provide platforms that unify various programming languages, fostering collaboration and streamlining tasks. This convergence of Cloud Computing with Python and SQL presents numerous benefits. Automation enhances efficiency, reduces human error, and ensures consistent control process execution. This synergy allows organizations to achieve scalability, cost savings, improved security, and comprehensive monitoring and reporting.
As institutions increasingly d on Cloud Computing to drive innovation and competitiveness, the importance of fortifying these systems against evolving threats cannot be overstated. Integrating Python and SQL represents a pivotal juncture in achieving this goal. By harnessing their combined power, organizations can create robust security mechanisms, streamline operations, and promote cross-functional collaboration. As the digital landscape evolves, embracing this approach is crucial for sustaining success in a rapidly changing environment.
Keywords: Cloud computing, python, SQL, virtualization, computing models, process redesign, cybersecurity, data integrity, risk management, data privacy, compliance, performance, functionality, debt, hex, Dataiku
How to Cite
References
Olaniyi OO, Okunleye OJ, Olabanji SO. Advancing data-driven decision- making in smart cities through big data analytics: A comprehensive review of existing literature. Current Journal of Applied Science and Technology. 2023;42(25):10–18. Available:https://doi.org/10.9734/cjast/2023/v42i254181
Mackita M, Soo-Young S, Tae-Young C. ERMOCTAVE: A risk management framework for IT systems which adopt cloud computing. Future Internet. 2019;11(9)195. Available:https://doi.org/10.3390/fi11090195
Olaniyi OO, Olaoye OO, Okunleye OJ. Effects of Information Governance (IG) on profitability in the Nigerian banking sector. Asian Journal of Economics, Business and Accounting. 2023;23(18):22–35.
Available:https://doi.org/10.9734/ajeba/2023/v23i181055
Olaniyi OO, Omubo DS. The importance of COSO framework compliance in information technology auditing and enterprise resource management. The International Journal of Innovative Research & Development; 2023.
Available:https://doi.org/10.24940/ijird/2023/v12/i5/MAY23001
Hansraj TPK, Chaudhary A. Security at virtualization level in cloud computing. 2021 9th international conference on reliability, Infocom Technologies and Optimization. 2021;1–5. Available:https://doi.org/10.1109/ICRITO51393.2021.9596105
Tabrizchi H, Rafsanjani M. A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing. 2020;76(12):9493-9532. Available:https://doi.org/10.1007/s11227-020-03213-1
Waguia JDK, Menshchikov A. Threats and security issues in cloud storage and content delivery networks: Analysis. Conference of Open Innovations Association (FRUCT). 2021;28(1):194–199.
Available:https://doi.org/10.23919/FRUCT50888.2021.9347609
Zuo C, Lin Z, Zhang Y. Why does your data leak? Uncovering the data leakage in cloud from mobile apps. IEEE Symposium on Security and Privacy. 2019;1296-1310. Available:https://doi.org/10.1109/SP.2019.00009
Beyeler. Open CV with Python blueprints: Design and develop advanced computer vision projects using OpenCV with Python (1st edition). Packt Publishing; 2015.
Atiewi S, Abuhussein A, Saleh MA. Impact of virtualization on cloud computing energy consumption: an empirical study. In Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control. 2018;1-7. Available:https://doi.org/10.1145/3284557.3284738
Morrow T. 12 risks, threats, & vulnerabilities in moving to the cloud. Software Engineering Institute, Carnegie Mellon University; 2018. Available:https://insights.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/
Jurek M, Gelgotas M. Virtualization and cloud computing versus organization management in the realities of industry 4.0. Nowoczesne Systemy Zarządzania. 2021;16(2):39–47. Available:https://doi.org/10.37055/nsz/139359
Khelf R, Ghoualmi-Zine N. IPsec/Firewall security policy analysis: A survey. International Conference on Signal, Image, Vision, and Their Applications (SIVA). 2018;1–7. Available:https://doi.org/10.1109/SIVA.2018.8660973
Singh M. Virtualization in Cloud Computing- a Study. International Conference on Advances in Computing, Communication Control, and Networking (ICACCCN). 2018;64–67. Available:https://doi.org/10.1109/ICACCCN.2018.8748398
O'Sullivan F. Top 10 major risks associated with cloud storage in 2023. Cloud Wards; 2021. Available:https://www.cloudwards.net/top-ten-major-risks-associated-with-cloud-storage/
Hanafi R, Wibowo LA, Rahayu A. Organization and IT strategic alignment, determination of IT process priorities using COBIT 5. 2020 International Conference on Advancement in Data Science, E-Learning and Information Systems (ICADEIS). 2020;1–6. Available:https://doi.org/10.1109/ICADEIS49811.2020.9277302
Pearlson KE, Saunders CS, Galletta DF. Managing and using information systems: A strategic approach. John Wiley & Sons, Inc., 7th Edition; 2020. ISBN: 978-1-119- 56115–6.
Rajput AS. Risk management in cloud computing. Interview Bit Technologies Pvt Limited; 2022.
Available:https://www.scaler.com/topics/cloud-computing/risk-management-in-cloud-computing/
Gravel N. Baseline security measures for cloud environments. Gray, Gray & Gray LLP; 2023.
Available:https://www.gggllp.com/baseline-security-measures-for-cloud-environments/
Meena JK, Kumar BR. Efficient virtualization in cloud computing. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC). 2021;227–232.
Available:https://doi.org/10.1109/ICCMC51019.2021.9418425
Fotiou N, Macha A, Polyzos GC, Xylomenos G. Access control as a service for the cloud. Journal of Internet Services and Applications. 2015;6 (1):1. Available:https://doi.org/10.1186/s13174-015-0026-4
Chang V, Golightly L, Modesti P, Xu QA, Le Minh TD, Hall K, Boddu S, Kobusińska A. A survey on intrusion detection systems for fog and cloud computing. Future Internet. 2022;14(3):89.
Available:https://doi.org/10.3390/fi14030089
Dauti B. Windows Server 2022 Administration Fundamentals. Packt Publishing; 2022. ISBN-13: 978-1803232157.
Yang P, Xiong N, Ren J. Data security and privacy protection for cloud storage: A survey. IEEE; 2020. Access, 8, 131723-131740. Available:https://doi.org/10.1109/ACCESS.2020.3009876
Buuck B. Python vs. SQL: A Deep Dive Comparison. Stream Sets; 2022. Available:https://streamsets.com/blog/python-vs-sql/
Zhu L. Snowpark: Unified tools and infrastructure for SQL and Python. Snowflake Inc; 2023.
Available:https://www.snowflake.com/blog/snowpark-tools-infrastructure-sql-python/
MySQL. Connecting to MySQL using connector/Python; 2023.
Available:https://dev.mysql.com/doc/connector-python/en/connector-python-example-connecting.html
Friedman AA, West DM. Privacy and security in cloud computing. Issues in Technology Innovation; 2010.
Available:https://www.brookings.edu/wp-content/uploads/2016/06/1026_cloud_computing_friedman_west.pdf
Gibbs M, Bazylik S. How is new technology changing job Design? IZA World of Labor; 2022;344.
Available:https://doi.org/10.15185/izawol.344.v2
Harris M, Khan RZ. A systematic review on cloud computing. International Journal of Computer Sciences and Engineering. 2018;6:632-639. Available:https://doi.org/10.26438/ijcse/v6i11.632639
Malisow B. ISC2 Certified Cloud Security Professional Official Study Guide. Sybex; 2020. ISBN-13: 978-1119603375.
Microsoft. Licensing microsoft server products for use in virtual environments. Microsoft Corporation; 2020.
Oktian YE, Witanto EN, Lee SG. A conceptual architecture in decentralizing computing, storage, and networking aspect of iot infrastructure. IoT. 2021;2(2):205–221. Available:https://doi.org/10.3390/iot2020011
Olagbaju OO, Babalola RO, Olaniyi OO. Code alternation in english as a second language classroom: A communication and learning strategy. Nova Science; 2023. Available:https://doi.org/10.52305/YLHJ5878
Olagbaju OO, Olaniyi OO. Explicit and differentiated phonics instruction on pupils’ literacy skills in gambian lower basic schools. Asian Journal of Education and Social Studies. 2023;44(2):20–30.
Available:https://doi.org/10.9734/ajess/2023/v44i2958
Olaniyi OO, Omubo DS. WhatsApp data policy, data security, and users’ vulnerability. The International Journal of Innovative Research & Development; 2023. Available:https://doi.org/10.24940/ijird/2023/v12/i4/APR23021
Ritter J. E-discovery in the Cloud introduces security and compliance issues. Tech Target; 2018.
Udayakumar P. Design and deploy microsoft azure virtual desktop: An essential guide for architects and administrators. Apress; 2022.
ISBN-13:978-1-4842-7796-6. Available:https://doi.org/10.1007/978-1-4842-7796-6
Wang Z, Wang N, Su X, Ge S. Differentiated management strategies on cloud computing data security driven by data value. Information Security Journal. 2016;25(4-6):280–294.
Available:https://doi.org/10.1080/19393555.2016.1231353
Zhang Z, Nan G, Tan Y. Cloud services vs. on-premises software: Competition under security risk and product customization. Information Systems Research. 2020;31 (3):848–864. Available:http://dx.doi.org/10.2139/ssrn.2849459