Machine Learning-Enhanced Security for Multi-Cloud Oracle Database Deployments

Machine Learning-Enhanced Security for Multi-Cloud Oracle Database Deployments

Authors

  • Raghu Murthy Shankeshi Sr. MTS, Oracle America Inc., Virginia, USA

DOI:

https://doi.org/10.55662/JST.2024.5301

Downloads

Abstract

Multi-cloud Oracle Database deployments based on machine learning-enhanced security represents a sophisticated approach to reduce the emerging cyber threats at the same time assuring data integrity, confidentiality, and availability. The rapid adaptation of multi cloud strategies in organisation to optimise performance and scalability, complexity of securing Oracle Database instances across heterogeneous cloud environments increases. Traditional security mechanisms are not able to adapt to the dynamic nature of cloud infrastructure. This problem makes it necessary to integrate machine learning-driven threat detection, anomaly identification, and adaptive access control. This research paper aims to explore the application of advanced machine learning models which includes supervised, unsupervised, and reinforcement learning techniques, which is used to detect malicious activities, optimize database security configurations, and enhance compliance with regulatory frameworks.

Downloads

Download data is not yet available.

References

M. Qayyum, M. Usama, M. A. Qadir, and A. Al-Fuqaha, "Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security," IEEE Access, vol. 8, pp. 86942-86957, 2020.

M. A. Beyer and D. Laney, "The Importance of 'Big Data': A Definition," Gartner Research, 2012.

S. Zawoad and R. Hasan, "Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems," arXiv preprint arXiv:1302.6312, 2013.

J. Dean and S. Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters," Communications of the ACM, vol. 51, no. 1, pp. 107-113, 2008.

P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, 2011.

M. Armbrust et al., "A View of Cloud Computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.

D. Agrawal, S. Das, and A. El Abbadi, "Big Data and Cloud Computing: Current State and Future Opportunities," in Proceedings of the 14th International Conference on Extending Database Technology, 2011, pp. 530-533.

K. Hwang and D. Li, "Trusted Cloud Computing with Secure Resources and Data Coloring," IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, 2010.

S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.

C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing," The Journal of Supercomputing, vol. 63, no. 2, pp. 561-592, 2013.

W. A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing," in Proceedings of the 44th Hawaii International Conference on System Sciences, 2011, pp. 1-10.

S. Pearson and A. Benameur, "Privacy, Security and Trust Issues Arising from Cloud Computing," in Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, 2010, pp. 693-702.

C. Cachin, I. Keidar, and A. Shraer, "Trusting the Cloud," ACM SIGACT News, vol. 40, no. 2, pp. 81-86, 2009.

R. Buyya, C. S. Yeo, and S. Venugopal, "Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities," in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008, pp. 5-13.

L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A Break in the Clouds: Towards a Cloud Definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, 2008.

S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud Computing—The Business Perspective," Decision Support Systems, vol. 51, no. 1, pp. 176-189, 2011.

G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall, "Cloud Computing," IBM White Paper, 2007.

Downloads

Published

12-06-2024
Citation Metrics
DOI: 10.55662/JST.2024.5301
Published: 12-06-2024

How to Cite

Murthy Shankeshi, R. “Machine Learning-Enhanced Security for Multi-Cloud Oracle Database Deployments”. Journal of Science & Technology, vol. 5, no. 3, June 2024, pp. 90-132, doi:10.55662/JST.2024.5301.
PlumX Metrics

Plaudit

License Terms

Ownership and Licensing:

Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.

License Permissions:

Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.

Additional Distribution Arrangements:

Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.

Online Posting:

Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.

Responsibility and Liability:

Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.

Loading...