Automated Compliance Enforcement in Multi-Cloud Database Environments: A Comparative Study of Azure Purview, AWS Macie, and GCP DLP
DOI:
https://doi.org/10.32628/CSEIT25111668Keywords:
Cloud computing, data compliance, multi-cloud, GDPR, HIPAA, AWS, Microsoft Azure, GCP, cloud migrationAbstract
multi-cloud database compliance enforcement Automated compliance enforcement of databases accessed on multi-cloud platforms is needed to address changing regulatory requirements in dynamic cloud architecture. The lightning speed of the introduction of cloud computing has reshaped mode of data management and storage in organizations, making it more scalable, flexible, and cost-effective. But, with the growing application of multi-cloud infrastructures with more than one cloud service provider, including Amazon Web Services (AWS) and Microsoft Azure, and Google Cloud Platform (GCP), the action has brought about intricate issues regarding data compliance, regulatory conformity, and data security techniques. This paper will offer a detailed examination of data compliance in multi-cloud architecture along with the significant regulatory frameworks including GDPR and HIPAA, and the obstacles met during the structural integration and migration in multi-cloud. It also underlines the need to automate compliance to meet a changing regulatory environment and to mitigate the risk of operations. Additionally, the paper attributes AWS, Azure, and GCP along various fronts such as pricing, performance, security, usability, and data management to help organizations make superior decisions on their cloud adoption. Lastly, it draws roadmaps toward more compliance management with AI-based automation and blockchain-based audit, where future goals will focus on improving transparency and resiliency of the distributed cloud platforms.
📊 Article Downloads
References
V. Goyal and A. Kumar, “Review Paper On Comparison Of AWS, Microsoft Azure And Google Cloud Platform,” Int. Res. J. Mod. Eng. Technol. Sci., vol. 5, no. 12, 2023.
K. Evans, E. Stewart, and G. Foster, “Comprehensive Review of Cloud-Driven Machine Learning: A Comparative Analysis of AWS, Azure, and Google Cloud,” 2025. DOI: https://doi.org/10.36227/techrxiv.173611042.27406103/v1
V. Shah, “Analyzing Traffic Behavior in IoT-Cloud Systems : A Review of Analytical Frameworks,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 9, no. 3, pp. 877–885, 2023, doi: https://doi.org/10.32628/IJSRCSEIT. DOI: https://doi.org/10.32628/IJSRCSEIT
P. Somasundaram, “Navigating Regulatory Compliance in Multi-Cloud Environments: Challenges and Technological Solutions,” Int. J. Core Eng. Manag., vol. 7, no. 2, 2022.
A. Bhad, “Security and Compliance Challenges in Multi-Cloud Environments: A Comparative Study of Industry-Specific Strategies,” no. August, 2025. DOI: https://doi.org/10.9790/0661-2703035354
H. A. Imran et al., “Multi-Cloud: A Comprehensive Review,” in 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE, Nov. 2020, pp. 1–5. doi: 10.1109/INMIC50486.2020.9318176. DOI: https://doi.org/10.1109/INMIC50486.2020.9318176
P. Borra and H. P. Pamidipoola, “Serverless Computing: The Future of Scalability and Efficiency with AWS, Azure, and GCP,” Int. J. Adv. Res. Sci. Commun. Technol., no. April, pp. 505–514, Feb. 2025, doi: 10.48175/IJARSCT-23373. DOI: https://doi.org/10.48175/IJARSCT-23373
P. Borra, “Comparative Review: Top Cloud Service Providers ETL Tools -AWS vs. Azure vs. GCP,” SSRN Electron. J., no. June, 2024, doi: 10.2139/ssrn.4914175. DOI: https://doi.org/10.2139/ssrn.4914175
A. Folorunso, O. Babalola, C. E. Nwatu, and A. Adedoyin, “A comprehensive model for ensuring data compliance in cloud computing environment,” World J. Adv. Res. Rev., vol. 24, no. 2, pp. 1983–1995, Nov. 2024, doi: 10.30574/wjarr 2024.24.2.3514. DOI: https://doi.org/10.30574/wjarr.2024.24.2.3514
L. Campbell, “Security Compliance in Cloud Computing (e.g., GDPR, HIPAA),” 2025.
D. Patel, “The Role of Amazon Web Services in Modern Cloud Architecture: Key Strategies for Scalable Deployment and Integration,” Asian J. Comput. Sci. Eng., vol. 9, no. 4, pp. 1–9, 2024.
S. Tewari and A. Chitnis, “AI and Multi-Cloud Compliance : Safeguarding Data Sovereignty,” vol. 7, no. 7, pp. 571–587, 2024.
D. Antiya and O. Corporation, “Compliance as Code: Automating Compliance in Cloud Systems,” Int. J. Recent Innov. Trends Comput. Commun., vol. 8, no. February, 2025.
V. Shah, “Securing the Cloud of Things : A Comprehensive Analytics of Architecture , Use Cases , and Privacy Risks,” ESP J. Eng. Technol. Adv., vol. 3, no. 4, pp. 158–165, 2023, doi: 10.56472/25832646/JETA-V3I8P118.
A. Chennupati, “Challenges and Best Practices in Multi Cloud Migration for Enterprises,” vol. 7, no. 4, pp. 504–510, 2023.
N. Patel, “Secure Access Service Edge (SASE ): Evaluating The Impact Of Converged Network Security Architectures In Cloud Computing,” J. Emerg. Technol. Innov. Res., vol. 11, no. 3, 2024.
M. P. Patel and M. S. Gajjar, “Cloud Wars: A Comparative Study of AWS, Azure And Google Cloud,” Int. Res. J. Mod. Eng. Technol. Sci., vol. 5, no. 10, 2023.
D. Patel, “Zero Trust and DevSecOps in Cloud-Native Environments with Security Frameworks and Best Practices,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 3, pp. 454–464, Jan. 2023, doi: 10.48175/IJARSCT-11900D. DOI: https://doi.org/10.48175/IJARSCT-11900D
A. Mishra, “AI-Powered Cybersecurity Framework for Secure Data Transmission in IoT Network,” Int. J. Adv. Eng. Manag., vol. 7, no. 3, pp. 05–13, 2025. DOI: https://doi.org/10.35629/5252-07030513
S. S. S. Neeli, “Securing and Managing Cloud Databases for Business - Critical Applications,” J. Eng. Appl. Sci. Technol., vol. 7, no. 1, p. 6, 2025. DOI: https://doi.org/10.47363/JEAST/2025(7)285
P. Borra, “Comparison and Analysis of Leading Cloud Service Providers (AWS, Azure and GCP),” Int. J. Adv. Res. Eng. Technol., vol. 15, no. 3, pp. 266–278, 2024, doi: 10.2139/ssrn.4914145. DOI: https://doi.org/10.2139/ssrn.4914145
M. Menghnani, “Modern Full Stack Development Practices for Scalable and Maintainable Cloud-Native Applications,” vol. 10, no. 2, 2025, doi: doi.org/10.5281/zenodo.14959407.
S. Singamsetty, “Fuzzy-Optimized Lightweight Cyber-Attack Detection For Secure Edge-Based IoT Network.,” J. Crit. Rev., vol. 6, no. 07, pp. 1028–1033, 2019, doi: 10.53555/jcr.v6:i7.13156.
G. Maddali, “An Efficient Bio-Inspired Optimization Framework for Scalable Task Scheduling in Cloud Computing Environments,” Int. J. Curr. Eng. Technol., vol. 15, no. 3, 2025. DOI: https://doi.org/10.2139/ssrn.5276651
A. Chauhan, “A Comparative Study of Cloud Computing Platforms,” Turkish J. Comput. Math. Educ., vol. 11, no. 1, pp. 821–826, 2020, doi: 10.17762/turcomat.v11i1.13563. DOI: https://doi.org/10.17762/turcomat.v11i1.13563
O. A. Alqahtani and M. Alsandouny, “Comprehensive Comparison of Cloud Storage: GCP, AWS, AND AZURE,” Int. J. Eng. Res. Appl. www.ijera.com, vol. 15, no. 3, pp. 27–35, 2025, doi: 10.9790/9622-15032735.
S. Garg, “Predictive Analytics and Auto Remediation using Artificial Intelligence and Machine learning in Cloud Computing Operations,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 7, no. 2, 2019.
B. Patil, “Integration of Blockchain with AWS and Azure for Enhanced Cloud Security and Compliance in Multi-Cloud Architectures,” in 2025 International Conference on Computing and Communication Technologies (ICCCT), 2025, pp. 1–5. doi: 10.1109/ICCCT63501.2025.11018983. DOI: https://doi.org/10.1109/ICCCT63501.2025.11018983
D. Man and H. Tai, “Research on Data Encryption and Privacy Protection Technologies in Cloud Computing Environments,” in 2024 International Conference on Information Technology, Communication Ecosystem and Management (ITCEM), 2024, pp. 145–150. doi: 10.1109/ITCEM65710.2024.00035. DOI: https://doi.org/10.1109/ITCEM65710.2024.00035
X. Yu, “Research on Security Algorithm of Cross-Cloud Data Sharing Supported by Blockchain,” in 2024 IEEE 2nd International Conference on Electrical, Automation and Computer Engineering (ICEACE), 2024, pp. 1308–1312. doi: 10.1109/ICEACE63551.2024.10899028. DOI: https://doi.org/10.1109/ICEACE63551.2024.10899028
M. Morello, P. Sainio, and M. Alshawki, “Regulatory Compliance Verification: A Privacy Preserving Approach,” in 2024 8th Cyber Security in Networking Conference (CSNet), 2024, pp. 263–267. doi: 10.1109/CSNet64211.2024.10851761. DOI: https://doi.org/10.1109/CSNet64211.2024.10851761
A. S. S. Ansyah et al., “MQTT Broker Performance Comparison between AWS, Microsoft Azure and Google Cloud Platform,” in 2023 International Conference on Recent Trends in Electronics and Communication (ICRTEC), IEEE, Feb. 2023, pp. 1–6. doi: 10.1109/ICRTEC56977.2023.10111870. DOI: https://doi.org/10.1109/ICRTEC56977.2023.10111870
B. Liu, Y. Xin, and S. Dai, “Blockchain-based Disaster Recovery Data Storage and Security Auditing Solution in Multi-cloud Environment,” in 2022 International Applied Computational Electromagnetics Society Symposium, ACES-China 2022, 2022. doi: 10.1109/ACES-China56081.2022.10065296. DOI: https://doi.org/10.1109/ACES-China56081.2022.10065296
A. Joshi, A. Raturi, S. Kumar, A. Dumka, and D. P. Singh, “Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks,” in 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), 2022, pp. 230–233. doi: 10.1109/ICFIRTP56122.2022.10063186. DOI: https://doi.org/10.1109/ICFIRTP56122.2022.10063186
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.