Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) Techniques
DOI:
https://doi.org/10.47941/ijce.2764Keywords:
Machine Learning, Deep Learning, Natural Language Processing, Intrusion Detection Systems, Threat Intelligence, Cybersecurity.Abstract
Cloud computing has revolutionized data storage, processing, and accessibility, but it also introduces significant security challenges, including data breaches, insider threats, unauthorized access, and distributed denial-of-service (DDoS) attacks. Traditional security approaches, such as rule-based firewalls and static access control mechanisms, struggle to counter increasingly sophisticated cyber threats. Artificial Intelligence (AI) has emerged as a transformative solution, leveraging machine learning (ML), deep learning (DL), and natural language processing (NLP) to enhance cloud security. AI-driven threat detection systems analyze vast datasets in real time, identifying anomalies and predicting potential attacks with high accuracy. AI-powered automated incident response mechanisms help mitigate security risks by proactively addressing vulnerabilities and adapting to evolving threats. The integration of AI techniques into cloud security frameworks, highlighting applications such as intelligent intrusion detection, adaptive authentication, AI-enhanced encryption, and automated compliance monitoring. The advantages AI brings in reducing response time, improving threat intelligence, and optimizing resource allocation. AI’s application in cybersecurity also poses challenges, including adversarial AI attacks, data bias, and computational overhead. By leveraging AI, organizations can achieve a more resilient and proactive defense against emerging cyber threats in cloud environments.
Downloads
References
P. Mell and T. Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, NIST Special Publication 800-145, 2011.
C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of cloud computing,” The Journal of Supercomputing, vol. 63, no. 2, pp. 561–592, 2013.
F. A. Alaba, M. Othman, I. A. Alzahrani, and F. Alotaibi, “Intrusion detection systems in cloud computing: A systematic review,” IEEE Access, vol. 7, pp. 148-461, 2019.
A. K. Sood and R. J. Enbody, “Targeted cyberattacks: A superset of advanced persistent threats,” IEEE Security & Privacy, vol. 11, no. 1, pp. 54–61, 2013.
R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” IEEE Symposium on Security and Privacy (SP), 2010, pp. 305–316.
F. M. Al-Janabi and R. M. Saeed, “A comparative study of machine learning techniques for intrusion detection systems,” International Journal of Network Security, vol. 22, no. 3, pp. 443–454, 2020.
C. Yin, Y. Zhu, J. Fei, and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: Methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014.
M. A. Ferrag, L. Maglaras, and H. Janicke, “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol. 54, pp. 102–122, 2020.
S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997.
D. K. Saini and K. Sharma, “Analysis of phishing attacks and countermeasures,” International Journal of Computer Applications, vol. 45, no. 21, pp. 12–16, 2012.
M. Abutaha, T. H. Al-Somani, and H. H. Al-Haija, “Behavioral biometric authentication using keystroke dynamics: A survey,” Security and Privacy Journal, vol. 3, no. 2, pp. 1–18, 2019.
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes,” IEEE Symposium on Security and Privacy (SP), 2012, pp. 553–567.
H. J. La and S. D. Kim, “A systematic process for developing high-quality cloud services,” IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 265–278, 2013.
N. S. Sivan and K. R. Ramesh, “AI-based cloud security solutions: A review on AWS and Azure security services,” International Journal of Cloud Computing and Services Science, vol. 9, no. 4, pp. 107–116, 2020.
M. Al-Rubaie and J. M. Chang, “Privacy-preserving machine learning: Threats and solutions,” IEEE Security & Privacy, vol. 17, no. 2, pp. 49–58, 2019.
A. Shokri and V. Shmatikov, “Privacy-preserving deep learning,” Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), 2015, pp. 1310–1321.
A. M. Lonea, D. E. Popescu, and H. Tianfield, “Detecting intruders in cloud computing environments using artificial intelligence,” International Journal of Information Security Science, vol. 2, no. 1, pp. 42–55, 2013.
J. C. Lin, T. T. Kuo, and H. L. Kao, “AI-driven identity and access management for hybrid cloud security,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1242–1255, 2021.
K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” National Institute of Standards and Technology (NIST) Special Publication 800-94, 2007.
A. T. Salama, M. A. E. Aziz, and H. A. Elewi, “Security automation and orchestration in cloud computing: Challenges and solutions,” IEEE Access, vol. 8, pp. 172632–172648, 2020.
Y. J. Zhang, Y. P. Xu, and J. X. Li, “Self-healing cloud computing systems: Concepts and implementation,” Journal of Cloud Computing: Advances, Systems, and Applications, vol. 8, no. 1, pp. 1–14, 2019.
T. Miller, “Explanation in artificial intelligence: Insights from the social sciences,” Artificial Intelligence Journal, vol. 267, pp. 1–38, 2019.
M. R. Asghar, G. Lee, M. N. Islam, and H. K. Kim, “A survey of hybrid intrusion detection systems: Current trends, challenges, and future research directions,” IEEE Access, vol. 9, pp. 108064–108085, 2021.
J. Rose, R. J. Anderson, and M. O’Neill, “Zero trust security models and AI-based authentication,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 485–500, 2020.
A. Shokri, M. Stronati, C. Song, and V. Shmatikov, “Privacy-preserving deep learning via federated learning,” IEEE Symposium on Security and Privacy (SP), 2017, pp. 1310–1323.
A. Patel, A. Taghavi, K. Bakhtiyari, and J. Celestino, “Quantum computing and AI-driven cryptographic security for cloud,” Journal of Cloud Security, vol. 14, no. 3, pp. 223–239, 2020.
C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,” Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211–407, 2014.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Tirumala Ashish Kumar Manne

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.