Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) Techniques

Authors

  • Tirumala Ashish Kumar Manne Institution of Affiliation

DOI:

https://doi.org/10.47941/ijce.2764

Keywords:

Machine Learning, Deep Learning, Natural Language Processing, Intrusion Detection Systems, Threat Intelligence, Cybersecurity.

Abstract

Cloud computing has revolutionized data storage, processing, and accessibility, but it also introduces significant security challenges, including data breaches, insider threats, unauthorized access, and distributed denial-of-service (DDoS) attacks. Traditional security approaches, such as rule-based firewalls and static access control mechanisms, struggle to counter increasingly sophisticated cyber threats. Artificial Intelligence (AI) has emerged as a transformative solution, leveraging machine learning (ML), deep learning (DL), and natural language processing (NLP) to enhance cloud security. AI-driven threat detection systems analyze vast datasets in real time, identifying anomalies and predicting potential attacks with high accuracy. AI-powered automated incident response mechanisms help mitigate security risks by proactively addressing vulnerabilities and adapting to evolving threats. The integration of AI techniques into cloud security frameworks, highlighting applications such as intelligent intrusion detection, adaptive authentication, AI-enhanced encryption, and automated compliance monitoring. The advantages AI brings in reducing response time, improving threat intelligence, and optimizing resource allocation. AI’s application in cybersecurity also poses challenges, including adversarial AI attacks, data bias, and computational overhead. By leveraging AI, organizations can achieve a more resilient and proactive defense against emerging cyber threats in cloud environments.

Downloads

Download data is not yet available.

References

P. Mell and T. Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, NIST Special Publication 800-145, 2011.

C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of cloud computing,” The Journal of Supercomputing, vol. 63, no. 2, pp. 561–592, 2013.

F. A. Alaba, M. Othman, I. A. Alzahrani, and F. Alotaibi, “Intrusion detection systems in cloud computing: A systematic review,” IEEE Access, vol. 7, pp. 148-461, 2019.

A. K. Sood and R. J. Enbody, “Targeted cyberattacks: A superset of advanced persistent threats,” IEEE Security & Privacy, vol. 11, no. 1, pp. 54–61, 2013.

R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” IEEE Symposium on Security and Privacy (SP), 2010, pp. 305–316.

F. M. Al-Janabi and R. M. Saeed, “A comparative study of machine learning techniques for intrusion detection systems,” International Journal of Network Security, vol. 22, no. 3, pp. 443–454, 2020.

C. Yin, Y. Zhu, J. Fei, and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: Methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014.

M. A. Ferrag, L. Maglaras, and H. Janicke, “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol. 54, pp. 102–122, 2020.

S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997.

D. K. Saini and K. Sharma, “Analysis of phishing attacks and countermeasures,” International Journal of Computer Applications, vol. 45, no. 21, pp. 12–16, 2012.

M. Abutaha, T. H. Al-Somani, and H. H. Al-Haija, “Behavioral biometric authentication using keystroke dynamics: A survey,” Security and Privacy Journal, vol. 3, no. 2, pp. 1–18, 2019.

J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes,” IEEE Symposium on Security and Privacy (SP), 2012, pp. 553–567.

H. J. La and S. D. Kim, “A systematic process for developing high-quality cloud services,” IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 265–278, 2013.

N. S. Sivan and K. R. Ramesh, “AI-based cloud security solutions: A review on AWS and Azure security services,” International Journal of Cloud Computing and Services Science, vol. 9, no. 4, pp. 107–116, 2020.

M. Al-Rubaie and J. M. Chang, “Privacy-preserving machine learning: Threats and solutions,” IEEE Security & Privacy, vol. 17, no. 2, pp. 49–58, 2019.

A. Shokri and V. Shmatikov, “Privacy-preserving deep learning,” Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), 2015, pp. 1310–1321.

A. M. Lonea, D. E. Popescu, and H. Tianfield, “Detecting intruders in cloud computing environments using artificial intelligence,” International Journal of Information Security Science, vol. 2, no. 1, pp. 42–55, 2013.

J. C. Lin, T. T. Kuo, and H. L. Kao, “AI-driven identity and access management for hybrid cloud security,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1242–1255, 2021.

K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” National Institute of Standards and Technology (NIST) Special Publication 800-94, 2007.

A. T. Salama, M. A. E. Aziz, and H. A. Elewi, “Security automation and orchestration in cloud computing: Challenges and solutions,” IEEE Access, vol. 8, pp. 172632–172648, 2020.

Y. J. Zhang, Y. P. Xu, and J. X. Li, “Self-healing cloud computing systems: Concepts and implementation,” Journal of Cloud Computing: Advances, Systems, and Applications, vol. 8, no. 1, pp. 1–14, 2019.

T. Miller, “Explanation in artificial intelligence: Insights from the social sciences,” Artificial Intelligence Journal, vol. 267, pp. 1–38, 2019.

M. R. Asghar, G. Lee, M. N. Islam, and H. K. Kim, “A survey of hybrid intrusion detection systems: Current trends, challenges, and future research directions,” IEEE Access, vol. 9, pp. 108064–108085, 2021.

J. Rose, R. J. Anderson, and M. O’Neill, “Zero trust security models and AI-based authentication,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 485–500, 2020.

A. Shokri, M. Stronati, C. Song, and V. Shmatikov, “Privacy-preserving deep learning via federated learning,” IEEE Symposium on Security and Privacy (SP), 2017, pp. 1310–1323.

A. Patel, A. Taghavi, K. Bakhtiyari, and J. Celestino, “Quantum computing and AI-driven cryptographic security for cloud,” Journal of Cloud Security, vol. 14, no. 3, pp. 223–239, 2020.

C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,” Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211–407, 2014.

Downloads

Published

2022-06-16

How to Cite

Manne, T. A. K. (2022). Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) Techniques. International Journal of Computing and Engineering, 3(1), 45–53. https://doi.org/10.47941/ijce.2764

Issue

Section

Articles