Secure Data Migration Strategies on AWS Cloud

Authors

  • Sarvesh Kumar Gupta

DOI:

https://doi.org/10.22399/ijcesen.3952

Keywords:

Secure data migration, AWS Cloud, encryption, blockchain, IAM, anomaly detection

Abstract

With the increase in cloud adoption in the worldwide market, data migration security is a key issue that many organizations are concerned about during the transition to on-premise infrastructure to the cloud infrastructure like the Amazon Web Services (AWS). The review will focus on the existing approaches, techniques, and solutions employed in the process of data security in the context of migration, such as encryption schemes, identity and access management (IAM), blockchain support and application, and AI-based anomaly detection. This paper identifies the weaknesses and strengths of the current methods by assessing their empirical outcomes, theory, and practical applications. The paper also offers a new layered model that can be used by practitioners and researchers in the process of end-to-end secure migration. The results indicate that, although AWS has powerful native resources, to secure data integrity, confidentiality, and regulatory compliance during the migration, multi-layered strategies need to be combined. Adaptive security, quantum-resistant cryptography, and autonomous policy-based data migration governance are the future research directions and the concluding part of the review.Besides, the paper indicates the necessity to align security operations with the evolving global compliance needs and operational realities such as hybrid cloud deployments and the issue of data sovereignty. It mentions that there is a necessity to automatize and introduce smart monitoring in order to achieve protection during and after migration. Performance and assurance can also be achieved through taking up proactive and adaptive security structures by the enterprises. Adaptive security, quantum-resistant cryptography, and autonomous policy-based data migration governance are the future research directions and the concluding part of the review.

References

[1] Amazon Web Services, Inc. (2023). Overview of Amazon Web Services. Retrieved from https://docs.aws.amazon.com/whitepapers/latest/aws-overview/aws-overview.pdf

[2] Khan, N., & Al-Yasiri, A. (2016). Towards secure data migration in cloud computing. Future Generation Computer Systems, 74, 385–392. https://doi.org/10.1016/j.future.2016.04.017

[3] Hossain, M. S., & Muhammad, G. (2016). Cloud-assisted Industrial Internet of Things (IIoT) – Enabled framework for health monitoring. Computer Networks, 101, 192–202. https://doi.org/10.1016/j.comnet.2016.01.009

[4] Zhang, Y., Qian, Y., & Sharif, H. (2018). Security and privacy in smart health: Efficient policy hiding attribute-based access control. IEEE Internet of Things Journal, 5(3), 2130–2145. https://doi.org/10.1109/JIOT.2018.2810822

[5] Zeng, Y., Li, J., & Wang, K. (2021). Secure and efficient data migration for big data analytics on cloud. Journal of Systems Architecture, 115, 102003. https://doi.org/10.1016/j.sysarc.2021.102003

[6] Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411. https://doi.org/10.1016/j.future.2017.11.022

[7] Li, M., & Liu, Y. (2022). Challenges and solutions for secure data migration in the cloud. International Journal of Cloud Applications and Computing, 12(1), 44–59. https://doi.org/10.4018/IJCAC.2022010103

[8] Ahmed, K., & Karthik, B. (2014). Secure data migration in cloud computing using AES encryption. International Journal of Computer Applications, 96(2), 7–13.

[9] Khan, N., & Al-Yasiri, A. (2016). Towards secure data migration in cloud computing. Future Generation Computer Systems, 74, 385–392. https://doi.org/10.1016/j.future.2016.04.017

[10] Tan, W., Li, H., & Yu, H. (2018). A secure and efficient data migration framework using hash verification. Journal of Cloud Computing, 7(1), 1–12. https://doi.org/10.1186/s13677-018-0118-4

[11] Sharma, P., & Dubey, H. (2019). Secure data migration using hybrid cryptography in cloud environment. International Journal of Computer Applications Technology and Research, 8(9), 393–398.

[12] Zhang, Q., & Lee, C. (2020). Secure transfer of big data in cloud computing using blockchain. Journal of Network and Computer Applications, 160, 102625. https://doi.org/10.1016/j.jnca.2020.102625

[13] Martins, L., & Silva, P. (2021). Risk assessment models for cloud data migration. Journal of Cloud Security and Computing, 6(2), 50–63.

[14] Patel, R., & Banerjee, S. (2021). End-to-end encryption in AWS cloud for secure data migration. International Journal of Cloud Applications and Computing, 11(3), 45–59. https://doi.org/10.4018/IJCAC.2021070103

[15] Mehta, A., & Rao, M. (2022). A review of security practices for AWS data migration. Cloud Computing Advances, 5(1), 22–38.

[16] Lin, Y., & Wang, J. (2023). Securing data migration in multi-cloud environments. Computer Standards & Interfaces, 85, 103640. https://doi.org/10.1016/j.csi.2023.103640

[17] Raza, M., & Li, F. (2024). AI-driven anomaly detection during cloud data migration. Journal of Information Security and Applications, 77, 103428. https://doi.org/10.1016/j.jisa.2024.103428

[18] Amazon Web Services. (2023). AWS Migration Hub and security best practices. Retrieved from https://aws.amazon.com/migration-hub/

[19] Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207

[20] Chowdhury, M., & Tanvir, A. (2021). A layered approach to cloud migration security: Principles and practices. Journal of Cloud Computing, 10(1), 1–15. https://doi.org/10.1186/s13677-021-00234-7

[21] Zeng, Y., Li, J., & Wang, K. (2021). Secure and efficient data migration for big data analytics on cloud. Journal of Systems Architecture, 115, 102003. https://doi.org/10.1016/j.sysarc.2021.102003

[22] Li, M., & Liu, Y. (2022). Challenges and solutions for secure data migration in the cloud. International Journal of Cloud Applications and Computing, 12(1), 44–59. https://doi.org/10.4018/IJCAC.2022010103

[23] Sultana, T., & Islam, M. M. (2023). Security auditing and compliance in cloud data migration: AWS case study. Cloud Security Journal, 5(3), 119–132.

[24] Kumar, A., & Singh, S. (2021). Performance evaluation of secure cloud data migration using AWS. Journal of Cloud Computing, 10(1), 12–24. https://doi.org/10.1186/s13677-021-00246-3

[25] Rahman, M., & Hassan, A. (2020). Hybrid encryption for secure data migration in distributed cloud systems. Future Generation Computer Systems, 106, 525–537. https://doi.org/10.1016/j.future.2019.11.019

[26] Wu, Y., & Zhang, J. (2023). AI-enhanced anomaly detection during cloud migration. Journal of Cybersecurity and Information Systems, 19(2), 75–89.

[27] Elhabbash, A., & Bensaou, B. (2022). Blockchain-based secure data transfer and audit trail in hybrid cloud. Computer Standards & Interfaces, 81, 103576. https://doi.org/10.1016/j.csi.2022.103576

[28] Chen, L., & Liu, J. (2023). Quantum-safe encryption: Trends and implications for cloud migration. Journal of Cryptographic Engineering, 13(1), 45–59. https://doi.org/10.1007/s13389-022-00291-4

[29] Morales, E., & Zhang, Y. (2022). AI-driven cloud security governance for secure data migration. Cloud Computing Advances, 6(3), 112–126.

[30] Kumar, R., & Williams, D. (2023). Federated identity and secure multi-cloud migration: Challenges and solutions. International Journal of Cloud Computing and Services Science, 12(2), 34–50.

[31] Ali, S., & Rahman, M. (2022). Lightweight blockchain protocols for secure cloud data transfer. Journal of Information Security Applications, 65, 103040. https://doi.org/10.1016/j.jisa.2022.103040

[32] Sharma, T., & Das, R. (2024). Automating compliance in cloud migration under emerging global regulations. Journal of Digital Governance and Policy, 9(1), 77–92.

Downloads

Published

2025-03-30

How to Cite

Sarvesh Kumar Gupta. (2025). Secure Data Migration Strategies on AWS Cloud. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3952

Issue

Section

Research Article