Hybrid Cloud Security: A Multi-Layered Approach for Securing Cloud-Native Applications

Authors

  • Sathish Srinivasan Member of Technical Staff | PayPal, Core Platforms & Infrastructure, San Francisco Bay Area, California, USA. Author
  • Suresh Bysani Venkata Naga Engineering Leader SAAS and Distributed systems Cohesity, San Francisco Bay Area, California, USA. Author
  • Krishnaiah Narukulla Principal Engineer | Roku and Cohesity, Distributed Systeems, Cloud & Machine Learning Expert, Sanfrancisco Bay Area, California, USA. Author

Keywords:

Hybrid Cloud Security, Cloud-Native Applications, Identity and Access Management (IAM), Container Security, DevSecOps, Incident Response

Abstract

While organizations advance in using cloud-native solutions, ensuring security in applications running on hybrid clouds has become very important. Hybrid clouds let organizations manage systems themselves and also access functions from the public cloud to benefit from high flexibility, scalability and lower spending. At the same time, cloud computing adds many new security issues due to its distributed design, mix of equipment and fast-changing threats. We offer in this paper a multi-tier defense system designed for hybrid cloud applications that focuses primarily on protecting cloud-native applications. This framework covers security for five important layers. Efforts include infrastructure protection, managing user access, application-level security, data security and privacy and remaining on watch and handling incidents instantly. Customers have the assurance that their applications are safe, thanks to network separation, secured containers, micro services-based authenticity, encryption methods and automated observations of threats. The framework also supports the use of DevSecOps and monitoring compliance at all times. By comparing several cases and analyzing them together, the paper shows how this strategy ensures that hybrid cloud systems are secure and still flexible and perform well. We have seen strong improvements in how fast threats are detected, how compliance is automated and how risks are managed. The research concludes that layered, adaptive security architecture is essential for protecting cloud-native workloads and ensuring secure digital transformation in hybrid environments

Downloads

Download data is not yet available.

References

[1] Kratzke, N., & Quint, P. C. (2017). Understanding cloud-native applications after 10 years of cloud computing systematic mapping study. Journal of Systems and Software, 126, 1-16.

[2] Lackermair, G. (2011). Hybrid cloud architectures for online commerce. Procedia Computer Science, 3, 550-555.

[3] Aktas, M. S. (2018). Hybrid cloud computing monitoring software architecture. Concurrency and Computation: Practice and Experience, 30(21), e4694.

[4] Kuo, Y. H., Jeng, Y. L., & Chen, J. N. (2013, July). A hybrid cloud storage architecture for service operational high availability. In 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (pp. 487-492). IEEE.

[5] Hybrid Cloud Security, cloudsecurityalliance, online. https://cloudsecurityalliance.org/research/topics/hybrid-cloud-security#

[6] Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International journal of information security, 13, 113-170.

[7] Galibus, T., Krasnoproshin, V. V., de Oliveira Albuquerque, R., Pignaton de Freitas, E., Galibus, T., Krasnoproshin, V. V., ... & Pignaton de Freitas, E. (2016). Cloud Environment Security Landscape. Elements of Cloud Storage Security: Concepts, Designs and Optimised Practices, 1-18.

[8] Trisha Paine, Top Cloud Security Challenges in 2020, online. https://blog.checkpoint.com/securing-the-cloud/top-cloud-security-challenges-in-2020/

[9] Govindarajan, V., Sonani, R., & Patel, P. S. (2020). Secure Performance Optimisation in Multi-Tenant Cloud Environments. Annals of Applied Sciences, 1(1).

[10] Hybrid Cloud Architecture: How It Works and Top 4 Architecture Patterns, cloudian, online. https://cloudian.com/guides/hybrid-cloud/hybrid-cloud-architecture/

[11] Khan, S., Parkinson, S., & Crampton, A. (2017, December). A multi-layered cloud protection framework. In Companion Proceedings of the 10th International Conference on Utility and Cloud Computing (pp. 233-238).

[12] What is a hybrid cloud? VMware, online. https://www.vmware.com/topics/hybrid-cloud

[13] Shi, Y. (2018, December). Data security and privacy protection in public cloud. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 4812-4819). IEEE.

[14] Check Point’s 2020 Cloud Security Report Highlights Enterprise Security Concerns and Challenges in Public Clouds, Check Point, online. https://www.checkpoint.com/press-releases/check-points-2020-cloud-security-report-highlights-enterprise-security-concerns-and-challenges-in-public-clouds/

[15] Cinque, M., Cotroneo, D., & Pecchia, A. (2018, October). Challenges and directions in security information and event management (SIEM). In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) (pp. 95-99). IEEE.

[16] Hybrid cloud monitoring is crucial for maintaining performance, security, and cost-efficiency. Here are 8 key practices, with coherence, https://www.withcoherence.com/articles/8-best-practices-for-monitoring-hybrid-cloud-environments

[17] Gordon, A. (2016). The hybrid cloud security professional. IEEE Cloud Computing, 3(1), 82-86.

[18] Hybrid Cloud Case Studies, cloudzone, https://www.cloudzone.io/category/casestudies/case-study-hybrid/

[19] Venkateswaran, S., & Sarkar, S. (2018). Architectural partitioning and deployment modeling on hybrid clouds. Software: Practice and Experience, 48(2), 345-365.

[20] Zero Trust Security for Hybrid-Cloud Workloads, accuknox, online. https://accuknox.com/platform/hybrid-cloud-security.

Published

2025-06-01

Issue

Section

Articles

How to Cite

1.
Srinivasan S, Venkata Naga SB, Narukulla K. Hybrid Cloud Security: A Multi-Layered Approach for Securing Cloud-Native Applications. IJETCSIT [Internet]. 2025 Jun. 1 [cited 2025 Sep. 17];1(2):26-3. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/229

Similar Articles

11-20 of 218

You may also start an advanced similarity search for this article.