Federated Security Control Data Fabric: Scalable Telemetry Normalization and Orchestration in Multi-Cloud Environments
DOI:
https://doi.org/10.22399/ijcesen.4414Keywords:
Multi-Cloud Security Architecture, Federated Data Fabric, Security Telemetry Normalization, Normalization, AI-Driven Threat Prioritization, Distributed Security OperationsAbstract
The adoption of multi-cloud architectures has fundamentally reshaped enterprise security operations, introducing unprecedented complexity in managing controls across heterogeneous environments. Traditional security paradigms built around centralized log collection through Security Information and Event Management (SIEM) and Security Orchestration and Automation Platforms(SOAR) struggle to scale economically and operationally when confronted with distributed cloud-native telemetry. Organizations now operate across multiple public cloud providers, each emitting high-volume preventive, detective, and remediative control telemetry in proprietary schemas. The financial cost of data egress and the processing delays introduced by centralized aggregation undermine real-time threat detection, while provider-specific visibility creates blind spots that sophisticated adversaries can exploit.
This paper proposes the Federated Security Control Data Fabric (F-SCDF) as a distributed-first architectural framework for multi-cloud security telemetry. The fabric keeps telemetry processing close to its source while enabling unified semantic interpretation and cross-environment orchestration. Distributed ingestion gateways perform local normalization, enrichment, and filtering to minimize data egress and accelerate event availability. A universal security control schema and semantic mapping registry provide consistent interpretation of heterogeneous events, while a federated lakehouse architecture enables unified querying across source environments without requiring centralized storage. An AI-driven signal prioritization broker applies machine learning models to suppress noise, risk-score events, and feed downstream orchestration systems with actionable intelligence rather than raw alert volume.The F-SCDF architecture delivers vendor-agnostic security operations that align economic efficiency with real-time detection requirements, providing a scalable foundation for protecting distributed enterprise assets as multi-cloud complexity and telemetry volume continue to grow.
References
[1] Tanner Luxner, "Cloud computing trends: Flexera 2024 State of the Cloud Report," Flexera Software LLC, 2024. [Online]. Available: https://www.flexera.com/blog/finops/cloud-computing-trends-flexera-2024-state-of-the-cloud-report/
[2] Gartner, "Gartner Forecasts Worldwide Public Cloud End-User Spending to Reach Nearly $600 Billion in 2023," 2022. [Online]. Available: https://www.gartner.com/en/newsroom/press-releases/2022-10-31-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-reach-nearly-600-billion-in-2023
[3] Zahra Shojaee Rad and Mostafa Ghobaei-Arani, "Federated serverless cloud approaches: A comprehensive review," Computers and Electrical Engineering, 2025. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S0045790625003155
[4] Visalakshmi Suresh et al., "Scalable and responsive event processing in the cloud," PMC Journal, 2013. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC3538295/
[5] Hanane Chliah et al., "Performance Security in Distributed Systems: Comparative Study," ResearchGate, 2018. [Online]. Available: https://www.researchgate.net/publication/384632560_Performance_Security_in_Distributed_System_Comparative_Study
[6] Tarun Jain et al., "Procuring Cloud Services: An Economic Analysis of Multi-cloud Strategy," SAGE Publications, 2025. [Online]. Available: https://journals.sagepub.com/doi/10.1177/10591478251326421
[7] Piyush Patil, "Optimizing low latency public cloud systems: Strategies for network, compute, and storage efficiency," WJARR, 2025. [Online]. Available: https://journalwjarr.com/sites/default/files/fulltext_pdf/WJARR-2025-1538.pdf
[8] Boddepalli Jahnavi, "Mitigating Security Risks in Multi-Cloud and Hybrid Cloud Environments: Cross-Cloud Communication and Threat Detection Frameworks," IJSET, 2024. [Online]. Available: https://www.ijset.in/wp-content/uploads/IJSET_V13_issue3_153.pdf
[9] Aptin Babaei et al., "A Review of Machine Learning-based Security in Cloud Computing," ResearchGate, 2023. [Online]. Available: https://www.researchgate.net/publication/373838363_A_Review_of_Machine_Learning-based_Security_in_Cloud_Computing
[10] Zscaler, "Zscaler ThreatLabz 2025 VPN Risk Report with Cybersecurity Insiders". [Online]. Available: https://www.zscaler.com/campaign/threatlabz-vpn-risk-report
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.